Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
FpiUD4nYpj.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\2FBE.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\34CA.exe
|
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\BD9E.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ExtractedLumma\g2m.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ExtractedLumma\lm.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ExtractedVenom\g2m.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ExtractedVenom\runvm.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ExtractedVenom\vm.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\rentry-script.ps1
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyStartupScript.vbs
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Roaming\jjistfr
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\jjistfr:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_lm.exe_ed6b1a814e4ec1e6e89791b3995c66bc9bb83_5fe582ea_4585aa2b-09a4-4321-a029-216d7f5f1659\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_vm.exe_12b9a62f7c411e90f74ee59af3dcf249dad3f7e8_19c5d0bb_5cda0b46-1c1f-4ec5-ad2f-eeb1ce6af232\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA01C.tmp.dmp
|
Mini DuMP crash report, 14 streams, Sat Jul 27 06:54:58 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA1C3.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA241.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBEEE.tmp.dmp
|
Mini DuMP crash report, 15 streams, Sat Jul 27 06:55:06 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC0D4.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC0F4.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\BD9E.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\vm.exe.log
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.dat
|
JSON data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\NotifyIcon\Microsoft.Explorer.Notification.{1A9F1A36-3C09-FABC-074C-A7C43D9E3759}.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ExtractedLumma\data.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ExtractedLumma\run.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ExtractedVenom\data.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d2q1enli.aly.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ds40pw40.fgb.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dvnk2koo.3zc.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pk1a0vey.sg1.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q205syu0.b5t.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vvgemafc.zot.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\lumma.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\venom.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{07036ADB-1CD6-4B03-9F61-A81C88B2E799}.png
|
PNG image data, 306 x 306, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{221CB7D1-ACDF-4515-9B12-B345D83C4B72}.png
|
PNG image data, 306 x 306, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{327941D6-724D-4966-9762-A326B2525378}.png
|
PNG image data, 306 x 306, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{361DAB93-4295-43D3-8AE5-A867C82BBE71}.png
|
PNG image data, 306 x 306, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{39B69EAA-9F7A-4CDE-8D7A-0C897DD82D9B}.png
|
PNG image data, 306 x 306, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{EEA4F1D0-28C9-4638-A52E-4C318BD324E5}.png
|
PNG image data, 306 x 306, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\{F836E79C-F7CE-41B2-B256-2B925A0BAB57}.png
|
PNG image data, 306 x 306, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Roaming\MyData\DataLogs.conf
|
ASCII text
|
modified
|
||
\Device\Null
|
ASCII text
|
dropped
|
There are 35 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\FpiUD4nYpj.exe
|
"C:\Users\user\Desktop\FpiUD4nYpj.exe"
|
||
C:\Windows\explorer.exe
|
C:\Windows\Explorer.EXE
|
||
C:\Users\user\AppData\Roaming\jjistfr
|
C:\Users\user\AppData\Roaming\jjistfr
|
||
C:\Users\user\AppData\Local\Temp\2FBE.exe
|
C:\Users\user\AppData\Local\Temp\2FBE.exe
|
||
C:\Users\user\AppData\Local\Temp\34CA.exe
|
C:\Users\user\AppData\Local\Temp\34CA.exe
|
||
C:\Users\user\AppData\Local\Temp\BD9E.exe
|
C:\Users\user\AppData\Local\Temp\BD9E.exe
|
||
C:\Users\user\AppData\Local\Temp\BD9E.exe
|
"C:\Users\user\AppData\Local\Temp\BD9E.exe" -HOSTRUNAS
|
||
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
|
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -WindowStyle Hidden -File "C:\Users\user\AppData\Local\Temp\rentry-script.ps1"
|
||
C:\Users\user\AppData\Local\Temp\ExtractedVenom\vm.exe
|
"vm.exe"
|
||
C:\Users\user\AppData\Local\Temp\ExtractedLumma\lm.exe
|
"lm.exe"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyStartupScript.vbs"
|
||
C:\Users\user\AppData\Local\Temp\ExtractedVenom\vm.exe
|
"vm.exe"
|
||
C:\Users\user\AppData\Local\Temp\2FBE.exe
|
"C:\Users\user\AppData\Local\Temp\2FBE.exe"
|
||
C:\Users\user\AppData\Local\Temp\2FBE.exe
|
"C:\Users\user\AppData\Local\Temp\2FBE.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\ExtractedVenom\runvm.bat
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\ExtractedLumma\run.bat
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\ExtractedVenom\runvm.bat" "
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5252 -s 1128
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 4936 -s 1848
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 15 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://100xmargin.com/tmp/index.php
|
|||
https://liernessfornicsa.shop/-
|
unknown
|
||
https://liernessfornicsa.shop/apitg
|
unknown
|
||
http://olinsw.ws/tmp/index.php
|
|||
https://liernessfornicsa.shop/0
|
unknown
|
||
http://mzxn.ru/tmp/index.php
|
|||
callosallsaospz.shop
|
|||
liernessfornicsa.shop
|
|||
https://liernessfornicsa.shop/q
|
unknown
|
||
https://107.173.160.139/
|
107.173.160.139
|
||
https://liernessfornicsa.shop/apii
|
unknown
|
||
shepherdlyopzc.shop
|
|||
upknittsoappz.shop
|
|||
https://mussangroup.com/wp-content/images/pic1.jpg
|
185.149.100.242
|
||
https://liernessfornicsa.shop/N
|
unknown
|
||
https://liernessfornicsa.shop/S
|
unknown
|
||
unseaffarignsk.shop
|
|||
https://liernessfornicsa.shop/apiH7%
|
unknown
|
||
http://wgdnb4rc.xyz/tmp/index.php
|
|||
https://107.173.160.137/
|
107.173.160.137
|
||
https://aka.ms/odirmr
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
|
unknown
|
||
https://api.msn.com:443/v1/news/Feed/Windows?
|
unknown
|
||
http://ocsps.ssl.com0?
|
unknown
|
||
http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt0
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
http://www.fontbureau.com/designers
|
unknown
|
||
http://crls.ssl.com/SSLcom-RootCA-EV-RSA-4096-R2.crl0
|
unknown
|
||
https://excel.office.com
|
unknown
|
||
https://callosallsaospz.shop/api3QFjF/HP
|
unknown
|
||
https://callosallsaospz.shop/apiD
|
unknown
|
||
https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we
|
unknown
|
||
https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
|
unknown
|
||
https://store4.gofile.io/download/direct/0656c5cf-51b4-4fa4-ae48-8ee5ed3d142e/lm.zip
|
31.14.70.245
|
||
http://www.sajatypeworks.com
|
unknown
|
||
http://www.founder.com.cn/cn/cThe
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://ocsps.ssl.com0_
|
unknown
|
||
http://www.galapagosdesign.com/DPlease
|
unknown
|
||
https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
|
unknown
|
||
http://www.urwpp.deDPlease
|
unknown
|
||
http://www.zhongyicts.com.cn
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://rentry.co
|
unknown
|
||
http://www.oberhumer.com
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
||
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
|
unknown
|
||
http://www.autoitscript.com/autoit3/J
|
unknown
|
||
https://wns.windows.com/L
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelp
|
unknown
|
||
https://word.office.com
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
https://store4.gofile.io
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
|
unknown
|
||
http://crl.mic
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
|
unknown
|
||
http://cert.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.cer0
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://www.carterandcone.coml
|
unknown
|
||
https://callosallsaospz.shop:443/api
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
|
unknown
|
||
http://www.fontbureau.com/designers/frere-user.html
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark
|
unknown
|
||
https://www.rd.com/list/polite-habits-campers-dislike/
|
unknown
|
||
https://android.notify.windows.com/iOS
|
unknown
|
||
https://store4.gofile.io/download/direct/6b24ec97-2a8d-468d-a24d-c8081cda1dab/vm.zip
|
31.14.70.245
|
||
https://support.microsof
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img
|
unknown
|
||
https://outlook.com_
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe
|
unknown
|
||
https://callosallsaospz.shop/
|
unknown
|
||
https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
https://callosallsaospz.shop/api
|
188.114.97.3
|
||
http://www.fontbureau.com/designersG
|
unknown
|
||
http://www.fontbureau.com/designers/?
|
unknown
|
||
http://www.founder.com.cn/cn/bThe
|
unknown
|
||
http://www.fontbureau.com/designers?
|
unknown
|
||
https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
funrecipebooks.com
|
162.0.235.84
|
||
rentry.co
|
104.26.2.16
|
||
mzxn.ru
|
211.40.39.251
|
||
liernessfornicsa.shop
|
172.67.213.85
|
||
mussangroup.com
|
185.149.100.242
|
||
callosallsaospz.shop
|
188.114.97.3
|
||
store4.gofile.io
|
31.14.70.245
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
77.221.157.163
|
unknown
|
Russian Federation
|
||
107.173.160.139
|
unknown
|
United States
|
||
107.173.160.137
|
unknown
|
United States
|
||
172.67.213.85
|
liernessfornicsa.shop
|
United States
|
||
162.0.235.84
|
funrecipebooks.com
|
Canada
|
||
109.172.114.212
|
unknown
|
Russian Federation
|
||
64.190.113.113
|
unknown
|
United States
|
||
94.156.79.190
|
unknown
|
Bulgaria
|
||
188.114.97.3
|
callosallsaospz.shop
|
European Union
|
||
78.89.199.216
|
unknown
|
Kuwait
|
||
104.26.2.16
|
rentry.co
|
United States
|
||
167.235.128.153
|
unknown
|
United States
|
||
193.222.96.24
|
unknown
|
Germany
|
||
185.149.100.242
|
mussangroup.com
|
Turkey
|
||
190.12.87.61
|
unknown
|
Peru
|
||
31.14.70.245
|
store4.gofile.io
|
Virgin Islands (BRITISH)
|
There are 6 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
|
Update#0005_8yUscnjrUY
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000B0068
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\wbarf\NccQngn\Ybpny\Grzc\2SOR.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000040272
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000090282
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000080160
|
VirtualDesktop
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
|
@explorerframe.dll,-13137
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
|
@explorerframe.dll,-13138
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbs\OpenWithProgids
|
VBSFile
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
|
@C:\Windows\System32\wshext.dll,-4511
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
{1NP14R77-02R7-4R5Q-O744-2RO1NR5198O7}\JFpevcg.rkr
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbs\OpenWithList
|
a
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbs\OpenWithList
|
MRUList
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
a
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
MRUList
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
|
Unpacker
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000080454
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
b
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000003044A
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000040444
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{9E04CAB2-CC14-11DF-BB8C-A2F1DED72085}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{FA99DFC7-6AC2-453A-A5E2-5E2AFF4507BD}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CAA59E3C-4792-41A5-9909-6A6A8D32490E}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{A3D53349-6E61-4557-8FC7-0028EDCEEBF6}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F2A1CB5A-E3CC-4A2E-AF9D-505A7009D442}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{BCB48336-4DDD-48FF-BB0B-D3190DACB3E2}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000070442
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
|
IconLayouts
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
|
CheckSetting
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
|
TaskbarStateLastRun
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
|
Implementing
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
|
WMP11.AssocFile.3G2
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
|
WMP11.AssocFile.3GP
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
|
WMP11.AssocFile.3G2
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
|
WMP11.AssocFile.3GP
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
|
WMP11.AssocFile.ADTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adts\OpenWithProgids
|
WMP11.AssocFile.ADTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
|
WMP11.AssocFile.AIFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
|
WMP11.AssocFile.AIFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithProgids
|
WMP11.AssocFile.AIFF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
|
WMP11.AssocFile.ASF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
|
WMP11.AssocFile.ASX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
|
WMP11.AssocFile.AU
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
|
AutoIt3Script
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
|
WMP11.AssocFile.AVI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
|
Paint.Picture
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
|
CABFolder
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
|
Microsoft.PowerShellCmdletDefinitionXML.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
|
CSSfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
|
Excel.CSV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
|
ddsfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
|
Paint.Picture
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
|
dllfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
|
Word.Document.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
|
Word.DocumentMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
|
Word.Document.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
|
Word.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
|
Word.TemplateMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
|
Word.Template.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
|
emffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
|
exefile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
|
WMP11.AssocFile.FLAC
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
|
fonfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
|
giffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
|
htmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
|
icofile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
|
inffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
|
inifile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
|
pjpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
|
jpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
|
jpegfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
|
wdpfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
|
lnkfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
|
WMP11.AssocFile.M2TS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
|
WMP11.AssocFile.m3u
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
|
WMP11.AssocFile.M4A
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
|
WMP11.AssocFile.MP4
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
|
mhtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
|
mhtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
|
WMP11.AssocFile.MK3D
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
|
WMP11.AssocFile.MKA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
|
WMP11.AssocFile.MKV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
|
WMP11.AssocFile.MOV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
|
WMP11.AssocFile.MP3
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2v\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\OpenWithProgids
|
WMP11.AssocFile.MP3
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
|
WMP11.AssocFile.MP4
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4v\OpenWithProgids
|
WMP11.AssocFile.MP4
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpeg\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpg\OpenWithProgids
|
WMP11.AssocFile.MPEG
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
|
Outlook.File.msg.15
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
|
WMP11.AssocFile.M2TS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
|
ocxfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
|
PowerPoint.OpenDocumentPresentation.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
|
Excel.OpenDocumentSpreadsheet.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
|
Word.OpenDocumentText.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
|
otffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
|
pngfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
|
PowerPoint.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
|
PowerPoint.TemplateMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
|
PowerPoint.Template.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
|
PowerPoint.Addin.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
|
PowerPoint.SlideShowMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
|
PowerPoint.SlideShow.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
|
PowerPoint.Show.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
|
PowerPoint.ShowMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
|
PowerPoint.Show.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
|
Microsoft.PowerShellScript.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
|
Microsoft.PowerShellXMLData.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
|
Microsoft.PowerShellData.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
|
Microsoft.PowerShellModule.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
|
Microsoft.PowerShellSessionConfiguration.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
|
rlefile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
|
WMP11.AssocFile.MIDI
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
|
Word.RTF.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
|
SHCmdFile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
|
SearchFolder
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
|
shtmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
|
PowerPoint.SlideMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
|
PowerPoint.Slide.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
|
WMP11.AssocFile.AU
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
|
sysfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
|
TIFImage.Document
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tiff\OpenWithProgids
|
TIFImage.Document
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
|
WMP11.AssocFile.TTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
|
ttcfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
|
ttffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
|
WMP11.AssocFile.TTS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
|
txtfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
|
bootstrap.vsto.1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
|
WMP11.AssocFile.WAV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
|
WMP11.AssocFile.WAX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
|
WMP11.AssocFile.ASF
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
|
WMP11.AssocFile.WMA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
|
wmffile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
|
WMP11.AssocFile.WMV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
|
WMP11.AssocFile.ASX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
|
WMP11.AssocFile.WPL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
|
WMP11.AssocFile.WVX
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
|
Excel.AddInMacroEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
|
Excel.Sheet.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
|
Excel.SheetBinaryMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
|
Excel.SheetMacroEnabled.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
|
Excel.Sheet.12
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
|
Excel.Template.8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
|
Excel.TemplateMacroEnabled
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
|
Excel.Template
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
|
xmlfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
|
xslfile
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\wbarf\NccQngn\Ybpny\Grzc\2SOR.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
MRUList
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Trgfgnegrq_8jrxlo3q8oojr!Ncc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.JvaqbjfSrrqonpxUho_8jrxlo3q8oojr!Ncc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.JvaqbjfZncf_8jrxlo3q8oojr!Ncc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Crbcyr_8jrxlo3q8oojr!k4p7n3o7ql2188l46q4ln362l19np5n5805r5k
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.ZvpebfbsgFgvpxlAbgrf_8jrxlo3q8oojr!Ncc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
{1NP14R77-02R7-4R5Q-O744-2RO1NR5198O7}\FavccvatGbby.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.JvaqbjfPnyphyngbe_8jrxlo3q8oojr!Ncc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
{1NP14R77-02R7-4R5Q-O744-2RO1NR5198O7}\zfcnvag.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.PybhqRkcrevraprUbfg_pj5a1u2gklrjl!Ncc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.FuryyRkcrevraprUbfg_pj5a1u2gklrjl!Ncc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
ZFRqtr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.PbagebyCnary
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Rkcybere
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Frnepu_pj5a1u2gklrjl!PbegnanHV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Puebzr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
jvaqbjf.vzzrefvirpbagebycnary_pj5a1u2gklrjl!zvpebfbsg.jvaqbjf.vzzrefvirpbagebycnary
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
308046O0NS4N39PO
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
{6Q809377-6NS0-444O-8957-N3773S02200R}\Nqbor\Npebong QP\Npebong\Npebong.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
{1NP14R77-02R7-4R5Q-O744-2RO1NR5198O7}\BcraJvgu.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.FgnegZrahRkcrevraprUbfg_pj5a1u2gklrjl!Ncc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
{1NP14R77-02R7-4R5Q-O744-2RO1NR5198O7}\pzq.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\wbarf\Qrfxgbc\BssvprFrghc.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
{6Q809377-6NS0-444O-8957-N3773S02200R}\Pbzzba Svyrf\zvpebfbsg funerq\PyvpxGbEha\BssvprPyvpxGbEha.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
{6Q809377-6NS0-444O-8957-N3773S02200R}\Pbzzba Svyrf\zvpebfbsg funerq\PyvpxGbEha\BssvprP2EPyvrag.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Bssvpr.RKPRY.RKR.15
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
R:\Frghc.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
R:\Bssvpr\Frghc32.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
\\192.168.2.1\nyy\bssvprqrcyblzraggbby_16731-20290.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
\\192.168.2.1\nyy\bssvpr2016ibyhzryvprafrcnpx_4324-1002_ra-hf_k86.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
{Q65231O0-O2S1-4857-N4PR-N8R7P6RN7Q27}\pfpevcg.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.FrpUrnyguHV_pj5a1u2gklrjl!FrpUrnyguHV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
{6Q809377-6NS0-444O-8957-N3773S02200R}\7-Mvc\7mSZ.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
{1NP14R77-02R7-4R5Q-O744-2RO1NR5198O7}\abgrcnq.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
{7P5N40RS-N0SO-4OSP-874N-P0S2R0O9SN8R}\NhgbVg3\NhgbVg3.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.TrgUryc_8jrxlo3q8oojr!Ncc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.KobkTnzvatBireynl_8jrxlo3q8oojr!Ncc
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
{Q65231O0-O2S1-4857-N4PR-N8R7P6RN7Q27}\JvaqbjfCbjreFuryy\i1.0\cbjrefuryy.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
\\192.168.2.1\nyy\cngputhneq-qvfnoyre-nyy-irefvbaf.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\wbarf\NccQngn\Ybpny\Grzc\2SOR.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
{1NP14R77-02R7-4R5Q-O744-2RO1NR5198O7}\JFpevcg.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
|
{0139Q44R-6NSR-49S2-8690-3QNSPNR6SSO8}\Npprffbevrf\Favccvat Gbby.yax
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
|
{0139Q44R-6NSR-49S2-8690-3QNSPNR6SSO8}\Npprffbevrf\Cnvag.yax
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
|
{N77S5Q77-2R2O-44P3-N6N2-NON601054N51}\Flfgrz Gbbyf\Pbageby Cnary.yax
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
|
P:\Hfref\Choyvp\Qrfxgbc\Tbbtyr Puebzr.yax
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
|
P:\Hfref\Choyvp\Qrfxgbc\Sversbk.yax
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
|
P:\Hfref\Choyvp\Qrfxgbc\Nqbor Npebong.yax
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
|
{9R3995NO-1S9P-4S13-O827-48O24O6P7174}\GnfxOne\Svyr Rkcybere.yax
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
|
{0139Q44R-6NSR-49S2-8690-3QNSPNR6SSO8}\Rkpry.yax
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
|
P:\Hfref\wbarf\Qrfxgbc\Rkpry 2016.yax
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
|
P:\Hfref\wbarf\Qrfxgbc\Rkpry.yax
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
|
{N77S5Q77-2R2O-44P3-N6N2-NON601054N51}\Flfgrz Gbbyf\Pbzznaq Cebzcg.yax
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\wbarf\NccQngn\Ybpny\Grzc\2SOR.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\wbarf\NccQngn\Ybpny\Grzc\2SOR.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\wbarf\NccQngn\Ybpny\Grzc\2SOR.rkr
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BD9E_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BD9E_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BD9E_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BD9E_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BD9E_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BD9E_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BD9E_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BD9E_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BD9E_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BD9E_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BD9E_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BD9E_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BD9E_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BD9E_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
There are 342 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
C000400000
|
direct allocation
|
page read and write
|
||
40B1000
|
unclassified section
|
page read and write
|
||
26F0000
|
direct allocation
|
page read and write
|
||
7FF65BBF0000
|
unkown
|
page readonly
|
||
40B1000
|
unclassified section
|
page read and write
|
||
29E0000
|
trusted library section
|
page read and write
|
||
4E40000
|
trusted library section
|
page read and write
|
||
4090000
|
direct allocation
|
page read and write
|
||
7FF65BBF0000
|
unkown
|
page readonly
|
||
3136000
|
trusted library allocation
|
page read and write
|
||
A8B3FFE000
|
stack
|
page read and write
|
||
9F9C000
|
stack
|
page read and write
|
||
2C9A000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
7FF65BBEE000
|
unkown
|
page write copy
|
||
3030000
|
unkown
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
7FFD9B8AB000
|
trusted library allocation
|
page execute and read and write
|
||
3020000
|
unkown
|
page read and write
|
||
3156000
|
trusted library allocation
|
page read and write
|
||
2AC4000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
6000000
|
trusted library allocation
|
page read and write
|
||
5E5000
|
heap
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
1DCCE994000
|
trusted library allocation
|
page read and write
|
||
5BA0000
|
trusted library allocation
|
page read and write
|
||
7FF5ED975000
|
unkown
|
page readonly
|
||
2AFC000
|
trusted library allocation
|
page read and write
|
||
1DCCE4B5000
|
trusted library allocation
|
page read and write
|
||
1DCCC45C000
|
heap
|
page read and write
|
||
3050000
|
unkown
|
page read and write
|
||
4280000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
3032000
|
heap
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
317F000
|
trusted library allocation
|
page read and write
|
||
4FA4000
|
trusted library allocation
|
page read and write
|
||
8BE9000
|
stack
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
15BDB1BA000
|
trusted library allocation
|
page read and write
|
||
3353000
|
trusted library allocation
|
page read and write
|
||
A491000
|
unkown
|
page read and write
|
||
3050000
|
unkown
|
page read and write
|
||
4E84000
|
trusted library allocation
|
page read and write
|
||
7FE08000
|
trusted library allocation
|
page execute and read and write
|
||
3130000
|
trusted library allocation
|
page read and write
|
||
218E000
|
stack
|
page read and write
|
||
2FBA000
|
heap
|
page read and write
|
||
2EC2E78B000
|
trusted library allocation
|
page read and write
|
||
2B0D000
|
trusted library allocation
|
page read and write
|
||
FEECBFD000
|
stack
|
page read and write
|
||
9AC0000
|
unkown
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
3344000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
7978000
|
unkown
|
page read and write
|
||
2B34000
|
trusted library allocation
|
page read and write
|
||
4EE0000
|
trusted library allocation
|
page read and write
|
||
7FF5ED4BB000
|
unkown
|
page readonly
|
||
6020000
|
trusted library allocation
|
page read and write
|
||
2C1E000
|
trusted library allocation
|
page read and write
|
||
C00001A000
|
direct allocation
|
page read and write
|
||
1DCE7AA2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
9875000
|
unkown
|
page read and write
|
||
2B24000
|
trusted library allocation
|
page read and write
|
||
5FE0000
|
trusted library allocation
|
page read and write
|
||
2B7E000
|
stack
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
24BF000
|
stack
|
page read and write
|
||
2EC2F6FA000
|
trusted library allocation
|
page read and write
|
||
54EF000
|
heap
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
3ABB7FE000
|
stack
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
626C000
|
stack
|
page read and write
|
||
3050000
|
unkown
|
page read and write
|
||
275A5270000
|
heap
|
page read and write
|
||
2A21000
|
trusted library allocation
|
page read and write
|
||
2C5B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8DC000
|
trusted library allocation
|
page execute and read and write
|
||
4FA4000
|
trusted library allocation
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
F56C8FD000
|
stack
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
7FF5ED9AE000
|
unkown
|
page readonly
|
||
2A1A000
|
trusted library allocation
|
page read and write
|
||
AAF2000
|
unkown
|
page read and write
|
||
5CD0000
|
trusted library allocation
|
page read and write
|
||
2A93000
|
trusted library allocation
|
page read and write
|
||
C00037E000
|
direct allocation
|
page read and write
|
||
54C1000
|
heap
|
page read and write
|
||
2B28000
|
trusted library allocation
|
page read and write
|
||
14B0000
|
unkown
|
page readonly
|
||
47F0000
|
heap
|
page read and write
|
||
79B1000
|
unkown
|
page read and write
|
||
2F9F000
|
heap
|
page read and write
|
||
3047000
|
heap
|
page read and write
|
||
2B2B000
|
trusted library allocation
|
page read and write
|
||
3210000
|
unkown
|
page read and write
|
||
3047000
|
heap
|
page read and write
|
||
6000000
|
trusted library allocation
|
page read and write
|
||
4F50000
|
trusted library allocation
|
page read and write
|
||
9AA0000
|
unkown
|
page read and write
|
||
2EC467B7000
|
heap
|
page read and write
|
||
335A000
|
trusted library allocation
|
page read and write
|
||
1DCCE490000
|
trusted library allocation
|
page read and write
|
||
6CA60000
|
unkown
|
page readonly
|
||
C00032D000
|
direct allocation
|
page read and write
|
||
1DCCE4B7000
|
trusted library allocation
|
page read and write
|
||
4F73000
|
trusted library allocation
|
page read and write
|
||
2A83000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
3120000
|
trusted library allocation
|
page read and write
|
||
3016000
|
heap
|
page read and write
|
||
314F000
|
trusted library allocation
|
page read and write
|
||
C4D0000
|
unkown
|
page read and write
|
||
54C1000
|
heap
|
page read and write
|
||
15BDAF40000
|
heap
|
page execute and read and write
|
||
2570000
|
heap
|
page read and write
|
||
2A89000
|
trusted library allocation
|
page read and write
|
||
2C50000
|
trusted library allocation
|
page read and write
|
||
5557000
|
stack
|
page read and write
|
||
1DCE9816000
|
heap
|
page read and write
|
||
2AA8000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
3047000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
44C000
|
trusted library allocation
|
page execute and read and write
|
||
3050000
|
unkown
|
page read and write
|
||
335A000
|
trusted library allocation
|
page read and write
|
||
3136000
|
trusted library allocation
|
page read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
300D000
|
heap
|
page read and write
|
||
7FF5ED8B4000
|
unkown
|
page readonly
|
||
FE02000
|
heap
|
page read and write
|
||
2961000
|
trusted library allocation
|
page read and write
|
||
26F0000
|
direct allocation
|
page read and write
|
||
A4AE000
|
unkown
|
page read and write
|
||
7FFD9BC08000
|
trusted library allocation
|
page read and write
|
||
3032000
|
heap
|
page read and write
|
||
303E000
|
heap
|
page read and write
|
||
C000050000
|
direct allocation
|
page read and write
|
||
1DCE8120000
|
heap
|
page read and write
|
||
1DCE813B000
|
heap
|
page read and write
|
||
4B78000
|
unkown
|
page read and write
|
||
600F000
|
stack
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
C49E000
|
stack
|
page read and write
|
||
2FA4000
|
heap
|
page read and write
|
||
A09C000
|
stack
|
page read and write
|
||
2B6E000
|
trusted library allocation
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
1E64A8C0000
|
heap
|
page read and write
|
||
1DCE9858000
|
heap
|
page read and write
|
||
2EC2EF61000
|
trusted library allocation
|
page read and write
|
||
2FA4000
|
heap
|
page read and write
|
||
2BF5000
|
trusted library allocation
|
page read and write
|
||
3359000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD30000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
3020000
|
unkown
|
page read and write
|
||
7FF5ED87D000
|
unkown
|
page readonly
|
||
4F64000
|
trusted library allocation
|
page read and write
|
||
1ABF360B000
|
heap
|
page read and write
|
||
3123000
|
trusted library allocation
|
page read and write
|
||
9AA0000
|
unkown
|
page read and write
|
||
2B7E000
|
trusted library allocation
|
page read and write
|
||
331E000
|
stack
|
page read and write
|
||
4A5E000
|
stack
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
7FF5ED743000
|
unkown
|
page readonly
|
||
28BD000
|
stack
|
page read and write
|
||
B370000
|
unkown
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
3027000
|
heap
|
page read and write
|
||
3156000
|
trusted library allocation
|
page read and write
|
||
7FF5EDA11000
|
unkown
|
page readonly
|
||
1DCCC502000
|
heap
|
page read and write
|
||
7FF5ED28E000
|
unkown
|
page readonly
|
||
3040000
|
unkown
|
page read and write
|
||
7FF5ED286000
|
unkown
|
page readonly
|
||
F56C672000
|
stack
|
page read and write
|
||
2CDD000
|
trusted library allocation
|
page read and write
|
||
22966320000
|
heap
|
page read and write
|
||
335A000
|
trusted library allocation
|
page read and write
|
||
26AE000
|
stack
|
page read and write
|
||
3042000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
B82A000
|
stack
|
page read and write
|
||
7D80000
|
unkown
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
1DCDE089000
|
trusted library allocation
|
page read and write
|
||
C00017A000
|
direct allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
27F0000
|
heap
|
page read and write
|
||
3FF1000
|
unclassified section
|
page readonly
|
||
7FFD9BC47000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDA0000
|
trusted library allocation
|
page read and write
|
||
1DCE9808000
|
heap
|
page read and write
|
||
7FF5ED9D2000
|
unkown
|
page readonly
|
||
3034000
|
heap
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
4F63000
|
trusted library allocation
|
page read and write
|
||
1ABF4F80000
|
heap
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
2BD5000
|
trusted library allocation
|
page read and write
|
||
53A000
|
heap
|
page read and write
|
||
1A460B7F000
|
direct allocation
|
page read and write
|
||
F56C6FD000
|
stack
|
page read and write
|
||
7FF764861000
|
unkown
|
page execute read
|
||
9AA0000
|
unkown
|
page read and write
|
||
18A0000
|
unkown
|
page readonly
|
||
517E000
|
stack
|
page read and write
|
||
5F3000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
7E11000
|
unkown
|
page read and write
|
||
405000
|
unkown
|
page readonly
|
||
1DCCC489000
|
heap
|
page read and write
|
||
4C60000
|
unkown
|
page read and write
|
||
2C92000
|
trusted library allocation
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
9AA0000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
4F5000
|
heap
|
page read and write
|
||
1DCCC3F0000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
2A70000
|
trusted library allocation
|
page read and write
|
||
8208000
|
stack
|
page read and write
|
||
2CFF000
|
stack
|
page read and write
|
||
335A000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3A4C000
|
trusted library allocation
|
page read and write
|
||
2710000
|
heap
|
page read and write
|
||
2BF0000
|
trusted library allocation
|
page read and write
|
||
2AC3000
|
trusted library allocation
|
page read and write
|
||
1DCCC5A0000
|
trusted library allocation
|
page read and write
|
||
B370000
|
unkown
|
page read and write
|
||
2F9E000
|
heap
|
page read and write
|
||
446000
|
trusted library allocation
|
page execute and read and write
|
||
312F000
|
trusted library allocation
|
page read and write
|
||
275A54B5000
|
heap
|
page read and write
|
||
4DDE000
|
stack
|
page read and write
|
||
923E000
|
stack
|
page read and write
|
||
2EC2E4A6000
|
trusted library allocation
|
page read and write
|
||
27C8000
|
trusted library allocation
|
page read and write
|
||
1DCCE760000
|
trusted library allocation
|
page read and write
|
||
2AD9000
|
trusted library allocation
|
page read and write
|
||
3139000
|
trusted library allocation
|
page read and write
|
||
2630000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
2AF2000
|
trusted library allocation
|
page read and write
|
||
335A000
|
trusted library allocation
|
page read and write
|
||
C88B000
|
unkown
|
page read and write
|
||
3125000
|
trusted library allocation
|
page read and write
|
||
7FF5ED97E000
|
unkown
|
page readonly
|
||
F56CBB8000
|
stack
|
page read and write
|
||
15BF37E0000
|
heap
|
page read and write
|
||
1ABF3600000
|
heap
|
page read and write
|
||
7FF5ED1EB000
|
unkown
|
page readonly
|
||
3700000
|
unkown
|
page read and write
|
||
2EC46110000
|
trusted library allocation
|
page read and write
|
||
B370000
|
unkown
|
page read and write
|
||
7FF5ED803000
|
unkown
|
page readonly
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
3356000
|
trusted library allocation
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
1DCE80C0000
|
heap
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
C8E1000
|
unkown
|
page read and write
|
||
2F9E000
|
heap
|
page read and write
|
||
2BBB000
|
trusted library allocation
|
page read and write
|
||
4EA1000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
1451000
|
unkown
|
page readonly
|
||
7DB0000
|
unkown
|
page read and write
|
||
3042000
|
heap
|
page read and write
|
||
293C000
|
stack
|
page read and write
|
||
F56CCB8000
|
stack
|
page read and write
|
||
5D01000
|
heap
|
page read and write
|
||
15BD94E0000
|
heap
|
page read and write
|
||
C00011E000
|
direct allocation
|
page read and write
|
||
BDA0000
|
unkown
|
page readonly
|
||
7FFD9B893000
|
trusted library allocation
|
page read and write
|
||
334A000
|
trusted library allocation
|
page read and write
|
||
314E000
|
trusted library allocation
|
page read and write
|
||
29FD000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
3125000
|
trusted library allocation
|
page read and write
|
||
3348000
|
trusted library allocation
|
page read and write
|
||
303A000
|
heap
|
page read and write
|
||
2F4D000
|
stack
|
page read and write
|
||
41F000
|
unkown
|
page readonly
|
||
2B78000
|
trusted library allocation
|
page read and write
|
||
7FF65C1AB000
|
unkown
|
page read and write
|
||
7FFD9BA2E000
|
trusted library allocation
|
page read and write
|
||
2EC2C300000
|
heap
|
page read and write
|
||
7FF5ED5A8000
|
unkown
|
page readonly
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
1240000
|
heap
|
page read and write
|
||
2CEC000
|
trusted library allocation
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
2B22000
|
trusted library allocation
|
page read and write
|
||
2CAB000
|
trusted library allocation
|
page read and write
|
||
3132000
|
trusted library allocation
|
page read and write
|
||
20A568FB000
|
heap
|
page read and write
|
||
C0003AC000
|
direct allocation
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
2EC2F154000
|
trusted library allocation
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
27C0000
|
trusted library allocation
|
page read and write
|
||
C000374000
|
direct allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
2CCC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
334A000
|
trusted library allocation
|
page read and write
|
||
9A10000
|
unkown
|
page read and write
|
||
15BD9607000
|
heap
|
page read and write
|
||
613000
|
heap
|
page read and write
|
||
4F48000
|
trusted library allocation
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
C00019C000
|
direct allocation
|
page read and write
|
||
6CA28000
|
unkown
|
page readonly
|
||
1DCCE0FE000
|
trusted library allocation
|
page read and write
|
||
FC24000
|
unkown
|
page read and write
|
||
7FFD9B8BC000
|
trusted library allocation
|
page execute and read and write
|
||
3010000
|
unkown
|
page read and write
|
||
A361000
|
unkown
|
page read and write
|
||
7FFD9B966000
|
trusted library allocation
|
page execute and read and write
|
||
3420000
|
unkown
|
page read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
335A000
|
trusted library allocation
|
page read and write
|
||
3168000
|
trusted library allocation
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
2B57000
|
trusted library allocation
|
page read and write
|
||
20A56908000
|
heap
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
2F9E000
|
heap
|
page read and write
|
||
26C8000
|
stack
|
page read and write
|
||
7DF4F3030000
|
unkown
|
page readonly
|
||
1DCE6890000
|
heap
|
page execute and read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
7FF65BB53000
|
unkown
|
page write copy
|
||
70A000
|
stack
|
page read and write
|
||
C000116000
|
direct allocation
|
page read and write
|
||
A29E000
|
stack
|
page read and write
|
||
A8B33FE000
|
stack
|
page read and write
|
||
986F000
|
unkown
|
page read and write
|
||
7FF65B6B1000
|
unkown
|
page execute read
|
||
7DB0000
|
unkown
|
page read and write
|
||
2767000
|
unclassified section
|
page read and write
|
||
7FF5ED7F1000
|
unkown
|
page readonly
|
||
4F44000
|
trusted library allocation
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
C0003CE000
|
direct allocation
|
page read and write
|
||
7FF65C21E000
|
unkown
|
page read and write
|
||
5BCE000
|
stack
|
page read and write
|
||
2C8C000
|
trusted library allocation
|
page read and write
|
||
3129000
|
trusted library allocation
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
15BDAF20000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
2B26000
|
trusted library allocation
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
405000
|
unkown
|
page readonly
|
||
2EC461DF000
|
heap
|
page read and write
|
||
7FF5ED1D7000
|
unkown
|
page readonly
|
||
3420000
|
unkown
|
page read and write
|
||
3016000
|
heap
|
page read and write
|
||
2AD9000
|
trusted library allocation
|
page read and write
|
||
303F000
|
heap
|
page read and write
|
||
2AA4000
|
trusted library allocation
|
page read and write
|
||
2A25000
|
trusted library allocation
|
page read and write
|
||
3590000
|
unkown
|
page read and write
|
||
2B91000
|
trusted library allocation
|
page read and write
|
||
2EC2C330000
|
trusted library section
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
143B000
|
stack
|
page read and write
|
||
1E64A980000
|
heap
|
page read and write
|
||
2C2B000
|
trusted library allocation
|
page read and write
|
||
2AD5000
|
trusted library allocation
|
page read and write
|
||
2A33000
|
trusted library allocation
|
page read and write
|
||
7FD67FF000
|
stack
|
page read and write
|
||
5E1000
|
heap
|
page read and write
|
||
3044000
|
heap
|
page read and write
|
||
300D000
|
heap
|
page read and write
|
||
2EC3E0E1000
|
trusted library allocation
|
page read and write
|
||
20A583D2000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
4E90000
|
trusted library allocation
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
A8B598F000
|
stack
|
page read and write
|
||
7FF5ED77C000
|
unkown
|
page readonly
|
||
443000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
60B15FF000
|
stack
|
page read and write
|
||
7FF7648ED000
|
unkown
|
page readonly
|
||
7FF5ED80C000
|
unkown
|
page readonly
|
||
3116000
|
trusted library allocation
|
page read and write
|
||
E89E000
|
stack
|
page read and write
|
||
1A460B5D000
|
direct allocation
|
page read and write
|
||
7857000
|
unkown
|
page read and write
|
||
2A37000
|
trusted library allocation
|
page read and write
|
||
3363000
|
trusted library allocation
|
page read and write
|
||
7FF5ED73D000
|
unkown
|
page readonly
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
3026000
|
heap
|
page read and write
|
||
2EC2E4AA000
|
trusted library allocation
|
page read and write
|
||
2B3B000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
335A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
B650000
|
unkown
|
page read and write
|
||
3F9D000
|
stack
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
F56CF3C000
|
stack
|
page read and write
|
||
2B13000
|
trusted library allocation
|
page read and write
|
||
2A50000
|
trusted library allocation
|
page read and write
|
||
3129000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
7DB0000
|
unkown
|
page read and write
|
||
304E000
|
heap
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
7FF5ED9ED000
|
unkown
|
page readonly
|
||
2B5F000
|
trusted library allocation
|
page read and write
|
||
1DCCC6F0000
|
heap
|
page read and write
|
||
1DCCE4AB000
|
trusted library allocation
|
page read and write
|
||
1A460C10000
|
direct allocation
|
page read and write
|
||
2EC3E13C000
|
trusted library allocation
|
page read and write
|
||
3050000
|
unkown
|
page read and write
|
||
3ABA7FE000
|
stack
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
2A12000
|
trusted library allocation
|
page read and write
|
||
C10A000
|
stack
|
page read and write
|
||
7FF5ED5C9000
|
unkown
|
page readonly
|
||
9B00000
|
unkown
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
41F000
|
unkown
|
page readonly
|
||
36B8000
|
trusted library allocation
|
page read and write
|
||
2FA4000
|
heap
|
page read and write
|
||
A8B0FFE000
|
stack
|
page read and write
|
||
3044000
|
heap
|
page read and write
|
||
2BBF000
|
trusted library allocation
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
2C07000
|
trusted library allocation
|
page read and write
|
||
2A91000
|
trusted library allocation
|
page read and write
|
||
3362000
|
trusted library allocation
|
page read and write
|
||
3080000
|
unkown
|
page read and write
|
||
7FFD9BDE0000
|
trusted library allocation
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
2B7E000
|
trusted library allocation
|
page read and write
|
||
15BF4B40000
|
heap
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
1440000
|
unkown
|
page read and write
|
||
2B48000
|
trusted library allocation
|
page read and write
|
||
1DCCE388000
|
trusted library allocation
|
page read and write
|
||
4F5D000
|
trusted library allocation
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
2ABF000
|
trusted library allocation
|
page read and write
|
||
7FF65BB4B000
|
unkown
|
page write copy
|
||
78AD000
|
unkown
|
page read and write
|
||
7FFD9B916000
|
trusted library allocation
|
page read and write
|
||
2AEA000
|
trusted library allocation
|
page read and write
|
||
3130000
|
trusted library allocation
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
3020000
|
unkown
|
page read and write
|
||
C0003B2000
|
direct allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
B983FF000
|
stack
|
page read and write
|
||
4F92000
|
trusted library allocation
|
page read and write
|
||
3430000
|
unkown
|
page read and write
|
||
2F8B000
|
heap
|
page read and write
|
||
A8B23FF000
|
stack
|
page read and write
|
||
3130000
|
trusted library allocation
|
page read and write
|
||
2B68000
|
trusted library allocation
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
1DCDE071000
|
trusted library allocation
|
page read and write
|
||
4E90000
|
trusted library allocation
|
page read and write
|
||
275A54B0000
|
heap
|
page read and write
|
||
335B000
|
trusted library allocation
|
page read and write
|
||
2C35000
|
trusted library allocation
|
page read and write
|
||
4F8C000
|
trusted library allocation
|
page read and write
|
||
4BC9000
|
unkown
|
page read and write
|
||
C00008C000
|
direct allocation
|
page read and write
|
||
7FF5EDA0B000
|
unkown
|
page readonly
|
||
3030000
|
unkown
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
B989FF000
|
stack
|
page read and write
|
||
2ABD000
|
trusted library allocation
|
page read and write
|
||
7D90000
|
unkown
|
page read and write
|
||
7FF5ED68F000
|
unkown
|
page readonly
|
||
20A584E8000
|
heap
|
page read and write
|
||
2B74000
|
trusted library allocation
|
page read and write
|
||
4F94000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
15BD94D0000
|
heap
|
page read and write
|
||
DD0000
|
unkown
|
page readonly
|
||
2C90000
|
trusted library allocation
|
page read and write
|
||
896B000
|
stack
|
page read and write
|
||
3034000
|
heap
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
7FF5ED6B9000
|
unkown
|
page readonly
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
4C1E000
|
unkown
|
page read and write
|
||
239F000
|
stack
|
page read and write
|
||
1DCCC650000
|
heap
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
791000
|
remote allocation
|
page execute and read and write
|
||
594000
|
heap
|
page read and write
|
||
7FF65BBEC000
|
unkown
|
page read and write
|
||
7FF5ED507000
|
unkown
|
page readonly
|
||
335A000
|
trusted library allocation
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
C000066000
|
direct allocation
|
page read and write
|
||
25D8000
|
stack
|
page read and write
|
||
335A000
|
trusted library allocation
|
page read and write
|
||
C6CF000
|
unkown
|
page read and write
|
||
1E64A6DA000
|
heap
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
300D000
|
heap
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
18D000
|
trusted library allocation
|
page execute and read and write
|
||
3030000
|
unkown
|
page read and write
|
||
7FF764860000
|
unkown
|
page readonly
|
||
3030000
|
unkown
|
page read and write
|
||
6030000
|
trusted library allocation
|
page read and write
|
||
97A9000
|
unkown
|
page read and write
|
||
7FFD9B946000
|
trusted library allocation
|
page execute and read and write
|
||
3020000
|
unkown
|
page read and write
|
||
4F5D000
|
trusted library allocation
|
page read and write
|
||
2CC4000
|
trusted library allocation
|
page read and write
|
||
2EC2F356000
|
trusted library allocation
|
page read and write
|
||
2EC3E3CA000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
2EC464AF000
|
heap
|
page read and write
|
||
5BA0000
|
trusted library allocation
|
page read and write
|
||
3359000
|
trusted library allocation
|
page read and write
|
||
15BDB0F0000
|
trusted library section
|
page readonly
|
||
20A58401000
|
heap
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
15BD958D000
|
heap
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
3034000
|
heap
|
page read and write
|
||
9550000
|
unkown
|
page readonly
|
||
2FFE000
|
stack
|
page read and write
|
||
4F88000
|
trusted library allocation
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
C00027E000
|
direct allocation
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
7FF5ED602000
|
unkown
|
page readonly
|
||
5590000
|
unkown
|
page write copy
|
||
3030000
|
unkown
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
580E000
|
stack
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
313E000
|
trusted library allocation
|
page read and write
|
||
5641000
|
unkown
|
page read and write
|
||
7FF764952000
|
unkown
|
page read and write
|
||
7FF5ED8E7000
|
unkown
|
page readonly
|
||
9A60000
|
unkown
|
page read and write
|
||
3220000
|
unkown
|
page readonly
|
||
1DCDE0EB000
|
trusted library allocation
|
page read and write
|
||
2C1E000
|
trusted library allocation
|
page read and write
|
||
7D80000
|
unkown
|
page read and write
|
||
2B55000
|
trusted library allocation
|
page read and write
|
||
4CE0000
|
unkown
|
page read and write
|
||
C000036000
|
direct allocation
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
4FAC000
|
trusted library allocation
|
page read and write
|
||
3169000
|
trusted library allocation
|
page read and write
|
||
15BD98D5000
|
heap
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
7D80000
|
unkown
|
page read and write
|
||
22966390000
|
heap
|
page read and write
|
||
3116000
|
trusted library allocation
|
page read and write
|
||
9AA0000
|
unkown
|
page read and write
|
||
7B80000
|
unkown
|
page read and write
|
||
7FDF0000
|
trusted library allocation
|
page execute and read and write
|
||
334B000
|
trusted library allocation
|
page read and write
|
||
2AFF000
|
trusted library allocation
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B93C000
|
trusted library allocation
|
page execute and read and write
|
||
7DF4F3031000
|
unkown
|
page execute read
|
||
2D70000
|
heap
|
page read and write
|
||
2AAC000
|
trusted library allocation
|
page read and write
|
||
335A000
|
trusted library allocation
|
page read and write
|
||
334A000
|
trusted library allocation
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
509D000
|
trusted library allocation
|
page read and write
|
||
3031000
|
heap
|
page read and write
|
||
7FF5ED990000
|
unkown
|
page readonly
|
||
2EC2C420000
|
heap
|
page read and write
|
||
3032000
|
heap
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
28F83000000
|
heap
|
page read and write
|
||
2BEC000
|
trusted library allocation
|
page read and write
|
||
300D000
|
heap
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
C0000B4000
|
direct allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
29CF000
|
stack
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
7FF5ED8AC000
|
unkown
|
page readonly
|
||
1DCE6910000
|
heap
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
7950000
|
unkown
|
page read and write
|
||
B370000
|
unkown
|
page read and write
|
||
1DCE7EAF000
|
heap
|
page read and write
|
||
A8B13FE000
|
stack
|
page read and write
|
||
3038000
|
heap
|
page read and write
|
||
5636000
|
heap
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
7FF5ED8F9000
|
unkown
|
page readonly
|
||
423000
|
unkown
|
page read and write
|
||
310C000
|
trusted library allocation
|
page read and write
|
||
3016000
|
heap
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
1DCE8136000
|
heap
|
page read and write
|
||
2A96000
|
trusted library allocation
|
page read and write
|
||
29EE000
|
stack
|
page read and write
|
||
9795000
|
unkown
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
2B13000
|
trusted library allocation
|
page read and write
|
||
2AAA000
|
trusted library allocation
|
page read and write
|
||
3173000
|
trusted library allocation
|
page read and write
|
||
2B63000
|
trusted library allocation
|
page read and write
|
||
F56CE3E000
|
stack
|
page read and write
|
||
486000
|
heap
|
page read and write
|
||
7FFD9BD70000
|
trusted library allocation
|
page execute and read and write
|
||
56E000
|
stack
|
page read and write
|
||
1DCCC670000
|
heap
|
page read and write
|
||
335A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5ED670000
|
unkown
|
page readonly
|
||
227F000
|
stack
|
page read and write
|
||
7FF5ED5C1000
|
unkown
|
page readonly
|
||
37F2000
|
unkown
|
page read and write
|
||
2BCC000
|
trusted library allocation
|
page read and write
|
||
2BC7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B86D000
|
trusted library allocation
|
page execute and read and write
|
||
22BE000
|
stack
|
page read and write
|
||
2EC2F956000
|
trusted library allocation
|
page read and write
|
||
335A000
|
trusted library allocation
|
page read and write
|
||
301C000
|
heap
|
page read and write
|
||
410000
|
heap
|
page read and write
|
||
1A460C60000
|
direct allocation
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
C507000
|
unkown
|
page read and write
|
||
96DF000
|
unkown
|
page read and write
|
||
7FF5ED40D000
|
unkown
|
page readonly
|
||
FD2B000
|
unkown
|
page read and write
|
||
3359000
|
trusted library allocation
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
4F8B000
|
trusted library allocation
|
page read and write
|
||
BAF9000
|
stack
|
page read and write
|
||
2EC465EE000
|
heap
|
page read and write
|
||
C6C9000
|
unkown
|
page read and write
|
||
2610000
|
trusted library section
|
page read and write
|
||
274E000
|
stack
|
page read and write
|
||
B370000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
27EE000
|
stack
|
page read and write
|
||
4F40000
|
trusted library allocation
|
page read and write
|
||
F56DB4F000
|
stack
|
page read and write
|
||
2600000
|
trusted library section
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
B8B0000
|
unkown
|
page read and write
|
||
C00030B000
|
direct allocation
|
page read and write
|
||
8A6E000
|
stack
|
page read and write
|
||
7FF5ED516000
|
unkown
|
page readonly
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
3025000
|
heap
|
page read and write
|
||
79FB000
|
unkown
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
2EC30071000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
311D000
|
trusted library allocation
|
page read and write
|
||
4090000
|
direct allocation
|
page read and write
|
||
311B000
|
trusted library allocation
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
1A41B8A8000
|
direct allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
2EC2C3F0000
|
trusted library allocation
|
page read and write
|
||
7FF5ED342000
|
unkown
|
page readonly
|
||
785D000
|
unkown
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
215F000
|
stack
|
page read and write
|
||
1DCCC6FD000
|
heap
|
page read and write
|
||
2BDA000
|
trusted library allocation
|
page read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
20A56880000
|
heap
|
page read and write
|
||
7FF5ED41C000
|
unkown
|
page readonly
|
||
3420000
|
unkown
|
page read and write
|
||
334E000
|
trusted library allocation
|
page read and write
|
||
3150000
|
unkown
|
page read and write
|
||
3122000
|
trusted library allocation
|
page read and write
|
||
7D80000
|
unkown
|
page read and write
|
||
1E64A984000
|
heap
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
C0002DC000
|
direct allocation
|
page read and write
|
||
7FF5ED295000
|
unkown
|
page readonly
|
||
7FFD9B8AB000
|
trusted library allocation
|
page execute and read and write
|
||
3030000
|
unkown
|
page read and write
|
||
7FF65BBEE000
|
unkown
|
page write copy
|
||
3FA1000
|
unclassified section
|
page execute read
|
||
97B5000
|
unkown
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
54C4000
|
heap
|
page read and write
|
||
2B4D000
|
trusted library allocation
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
9815000
|
unkown
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
2700000
|
remote allocation
|
page read and write
|
||
2A03000
|
trusted library allocation
|
page read and write
|
||
2BD1000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
9881000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
314F000
|
trusted library allocation
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
2296639A000
|
heap
|
page read and write
|
||
4131000
|
heap
|
page read and write
|
||
7D80000
|
unkown
|
page read and write
|
||
2F78000
|
heap
|
page read and write
|
||
2A22000
|
trusted library allocation
|
page read and write
|
||
2FA4000
|
heap
|
page read and write
|
||
9877000
|
unkown
|
page read and write
|
||
54E000
|
stack
|
page read and write
|
||
2D77000
|
heap
|
page read and write
|
||
1A460B85000
|
direct allocation
|
page read and write
|
||
312A000
|
trusted library allocation
|
page read and write
|
||
7FF5ED8A4000
|
unkown
|
page readonly
|
||
401000
|
unkown
|
page execute read
|
||
A8B698D000
|
stack
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
29F9000
|
trusted library allocation
|
page read and write
|
||
3158000
|
trusted library allocation
|
page read and write
|
||
7FF5ED1F1000
|
unkown
|
page readonly
|
||
7D90000
|
unkown
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page execute and read and write
|
||
1DCCE3A6000
|
trusted library allocation
|
page read and write
|
||
7FF5ED844000
|
unkown
|
page readonly
|
||
1370000
|
unkown
|
page read and write
|
||
3155000
|
trusted library allocation
|
page read and write
|
||
B97FFC000
|
stack
|
page read and write
|
||
AADB000
|
unkown
|
page read and write
|
||
3209000
|
stack
|
page read and write
|
||
3580000
|
unkown
|
page readonly
|
||
C0002C8000
|
direct allocation
|
page read and write
|
||
1E64A8E0000
|
heap
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
4F5B000
|
trusted library allocation
|
page read and write
|
||
60B14FF000
|
unkown
|
page read and write
|
||
9A5B000
|
unkown
|
page read and write
|
||
97C3000
|
unkown
|
page read and write
|
||
2EC467E1000
|
heap
|
page read and write
|
||
3039000
|
heap
|
page read and write
|
||
C000302000
|
direct allocation
|
page read and write
|
||
1DCE816D000
|
heap
|
page read and write
|
||
1DCCDEAD000
|
heap
|
page read and write
|
||
2B31000
|
trusted library allocation
|
page read and write
|
||
1DCCC420000
|
heap
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
2EC2E2F7000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
3374000
|
trusted library allocation
|
page read and write
|
||
3359000
|
trusted library allocation
|
page read and write
|
||
3359000
|
trusted library allocation
|
page read and write
|
||
C000192000
|
direct allocation
|
page read and write
|
||
7FFD9B883000
|
trusted library allocation
|
page execute and read and write
|
||
B370000
|
unkown
|
page read and write
|
||
3019000
|
heap
|
page read and write
|
||
3037000
|
heap
|
page read and write
|
||
275A5250000
|
heap
|
page read and write
|
||
271A000
|
heap
|
page read and write
|
||
2EC2F78B000
|
trusted library allocation
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
2728000
|
trusted library allocation
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
7DB0000
|
unkown
|
page read and write
|
||
2BD3000
|
trusted library allocation
|
page read and write
|
||
3037000
|
heap
|
page read and write
|
||
314E000
|
trusted library allocation
|
page read and write
|
||
B370000
|
unkown
|
page read and write
|
||
CB2E000
|
unkown
|
page read and write
|
||
A8B43FE000
|
stack
|
page read and write
|
||
E51C000
|
stack
|
page read and write
|
||
2B70000
|
trusted library allocation
|
page read and write
|
||
3049000
|
heap
|
page read and write
|
||
A8B27FE000
|
stack
|
page read and write
|
||
7FF5ED4C6000
|
unkown
|
page readonly
|
||
29F7000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD2B000
|
trusted library allocation
|
page read and write
|
||
A8AFC6E000
|
stack
|
page read and write
|
||
AB63000
|
unkown
|
page read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
57D0000
|
trusted library allocation
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
10C0000
|
unkown
|
page readonly
|
||
3420000
|
unkown
|
page read and write
|
||
1E64A7E0000
|
heap
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
B4D0000
|
unkown
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
9AA0000
|
unkown
|
page read and write
|
||
269F000
|
stack
|
page read and write
|
||
3352000
|
trusted library allocation
|
page read and write
|
||
56E000
|
heap
|
page read and write
|
||
3122000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
9AA0000
|
unkown
|
page read and write
|
||
3168000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
3362000
|
trusted library allocation
|
page read and write
|
||
1DCE60A0000
|
trusted library allocation
|
page read and write
|
||
A364000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
7E50000
|
unkown
|
page readonly
|
||
7FF5ED91A000
|
unkown
|
page readonly
|
||
2B63000
|
trusted library allocation
|
page read and write
|
||
2761000
|
unclassified section
|
page write copy
|
||
4CC0000
|
unkown
|
page read and write
|
||
2FA4000
|
heap
|
page read and write
|
||
7FF65BBE3000
|
unkown
|
page write copy
|
||
2C24000
|
trusted library allocation
|
page read and write
|
||
C0001A6000
|
direct allocation
|
page read and write
|
||
3019000
|
heap
|
page read and write
|
||
3348000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2CD1000
|
trusted library allocation
|
page read and write
|
||
2BE7000
|
trusted library allocation
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
3136000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
2BBC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
3131000
|
trusted library allocation
|
page read and write
|
||
8710000
|
unkown
|
page readonly
|
||
20A568FD000
|
heap
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
312F000
|
trusted library allocation
|
page read and write
|
||
2EC2C24E000
|
heap
|
page read and write
|
||
1A460D81000
|
direct allocation
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
4F4F000
|
trusted library allocation
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
311E000
|
trusted library allocation
|
page read and write
|
||
40D0000
|
heap
|
page read and write
|
||
3150000
|
unkown
|
page read and write
|
||
2FA4000
|
heap
|
page read and write
|
||
7C90000
|
unkown
|
page read and write
|
||
A8B718B000
|
stack
|
page read and write
|
||
7FF5ED86B000
|
unkown
|
page readonly
|
||
C000305000
|
direct allocation
|
page read and write
|
||
5CD0000
|
trusted library allocation
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
3178000
|
trusted library allocation
|
page read and write
|
||
6CAAB000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
2FD9000
|
heap
|
page read and write
|
||
3341000
|
trusted library allocation
|
page read and write
|
||
3010000
|
heap
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
C0002B2000
|
direct allocation
|
page read and write
|
||
C000134000
|
direct allocation
|
page read and write
|
||
7FFD9B8A4000
|
trusted library allocation
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
3153000
|
trusted library allocation
|
page read and write
|
||
1DCE984F000
|
heap
|
page read and write
|
||
1A41B785000
|
heap
|
page read and write
|
||
C0000CE000
|
direct allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
3430000
|
unkown
|
page read and write
|
||
7FFD9BA4B000
|
trusted library allocation
|
page read and write
|
||
2BFF000
|
trusted library allocation
|
page read and write
|
||
2EC46490000
|
heap
|
page read and write
|
||
2A4A000
|
trusted library allocation
|
page read and write
|
||
FCE4000
|
unkown
|
page read and write
|
||
7FF5ED8C6000
|
unkown
|
page readonly
|
||
2CA1000
|
trusted library allocation
|
page read and write
|
||
C0000CA000
|
direct allocation
|
page read and write
|
||
15BD9546000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
5F9000
|
heap
|
page read and write
|
||
3153000
|
trusted library allocation
|
page read and write
|
||
C000070000
|
direct allocation
|
page read and write
|
||
26E0000
|
trusted library allocation
|
page execute and read and write
|
||
4F9C000
|
trusted library allocation
|
page read and write
|
||
4F93000
|
trusted library allocation
|
page read and write
|
||
4F77000
|
trusted library allocation
|
page read and write
|
||
1DCCE918000
|
trusted library allocation
|
page read and write
|
||
4E8E000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
1505000
|
heap
|
page read and write
|
||
9F1E000
|
stack
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2448000
|
unkown
|
page readonly
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
5DCF000
|
stack
|
page read and write
|
||
3033000
|
heap
|
page read and write
|
||
3040000
|
unkown
|
page read and write
|
||
C000394000
|
direct allocation
|
page read and write
|
||
2C75000
|
trusted library allocation
|
page read and write
|
||
C00095A000
|
direct allocation
|
page read and write
|
||
7F30000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
1A460B89000
|
direct allocation
|
page read and write
|
||
6CA98000
|
unkown
|
page readonly
|
||
2EC461FE000
|
heap
|
page read and write
|
||
7FF5EDA14000
|
unkown
|
page readonly
|
||
313E000
|
trusted library allocation
|
page read and write
|
||
2F81000
|
heap
|
page read and write
|
||
3173000
|
trusted library allocation
|
page read and write
|
||
906E000
|
stack
|
page read and write
|
||
3031000
|
heap
|
page read and write
|
||
3025000
|
heap
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
431000
|
unkown
|
page read and write
|
||
6CAAC000
|
unkown
|
page write copy
|
||
511D000
|
trusted library allocation
|
page read and write
|
||
2B5B000
|
trusted library allocation
|
page read and write
|
||
E69E000
|
stack
|
page read and write
|
||
7FF5ED556000
|
unkown
|
page readonly
|
||
3030000
|
unkown
|
page read and write
|
||
2EC2DF1F000
|
heap
|
page read and write
|
||
FE0A000
|
heap
|
page read and write
|
||
F56D98D000
|
stack
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
1A41B780000
|
heap
|
page read and write
|
||
2EC3E0D1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
2700000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
4F9B000
|
trusted library allocation
|
page read and write
|
||
4E92000
|
trusted library allocation
|
page read and write
|
||
3011000
|
heap
|
page read and write
|
||
2B4A000
|
trusted library allocation
|
page read and write
|
||
5FE0000
|
trusted library allocation
|
page read and write
|
||
1A41B750000
|
heap
|
page read and write
|
||
1A460DE0000
|
direct allocation
|
page read and write
|
||
6020000
|
trusted library allocation
|
page read and write
|
||
3136000
|
trusted library allocation
|
page read and write
|
||
3022000
|
heap
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
5F3D000
|
stack
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
2A3C000
|
trusted library allocation
|
page read and write
|
||
C893000
|
unkown
|
page read and write
|
||
1A460D30000
|
direct allocation
|
page read and write
|
||
238F000
|
stack
|
page read and write
|
||
28F849A0000
|
heap
|
page read and write
|
||
A8B758C000
|
stack
|
page read and write
|
||
5D8000
|
heap
|
page read and write
|
||
2EC2C425000
|
heap
|
page read and write
|
||
3348000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7FF65BB52000
|
unkown
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
2550000
|
heap
|
page read and write
|
||
C000088000
|
direct allocation
|
page read and write
|
||
2EC46863000
|
heap
|
page read and write
|
||
2A35000
|
trusted library allocation
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
3020000
|
unkown
|
page read and write
|
||
6CA3B000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
7FF5ED4FD000
|
unkown
|
page readonly
|
||
3420000
|
unkown
|
page read and write
|
||
22966560000
|
heap
|
page read and write
|
||
3172000
|
trusted library allocation
|
page read and write
|
||
2A76000
|
trusted library allocation
|
page read and write
|
||
20A56A70000
|
heap
|
page read and write
|
||
9798000
|
unkown
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
C00012C000
|
direct allocation
|
page read and write
|
||
35A0000
|
trusted library allocation
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
79D3000
|
unkown
|
page read and write
|
||
6C9F0000
|
unkown
|
page readonly
|
||
4150000
|
heap
|
page read and write
|
||
7FF65C22A000
|
unkown
|
page write copy
|
||
2B4E000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
2B9A000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
4140000
|
heap
|
page read and write
|
||
3FE7000
|
unclassified section
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
20A584E9000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
301E000
|
heap
|
page read and write
|
||
2ADD000
|
trusted library allocation
|
page read and write
|
||
7FF7648ED000
|
unkown
|
page readonly
|
||
47BE000
|
stack
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
3350000
|
trusted library allocation
|
page read and write
|
||
7FF5ED4B0000
|
unkown
|
page readonly
|
||
7D90000
|
unkown
|
page read and write
|
||
1490000
|
unkown
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
3659000
|
stack
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
2BA3000
|
trusted library allocation
|
page read and write
|
||
2EC46839000
|
heap
|
page read and write
|
||
2A8D000
|
trusted library allocation
|
page read and write
|
||
7FF764861000
|
unkown
|
page execute read
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5125000
|
trusted library allocation
|
page read and write
|
||
6CA61000
|
unkown
|
page execute read
|
||
5F3000
|
heap
|
page read and write
|
||
60000
|
direct allocation
|
page execute and read and write
|
||
3134000
|
trusted library allocation
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
1DCE6900000
|
heap
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
2FA4000
|
heap
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
2690000
|
trusted library allocation
|
page read and write
|
||
258D000
|
heap
|
page execute and read and write
|
||
1E64A6FA000
|
heap
|
page read and write
|
||
2CCA000
|
trusted library allocation
|
page read and write
|
||
5F8000
|
heap
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
2B17000
|
trusted library allocation
|
page read and write
|
||
310F000
|
trusted library allocation
|
page read and write
|
||
4F76000
|
trusted library allocation
|
page read and write
|
||
4F45000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
2B95000
|
trusted library allocation
|
page read and write
|
||
2AFA000
|
trusted library allocation
|
page read and write
|
||
2C20000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
15BF3A35000
|
heap
|
page read and write
|
||
315E000
|
trusted library allocation
|
page read and write
|
||
B98BFF000
|
stack
|
page read and write
|
||
C000348000
|
direct allocation
|
page read and write
|
||
6000000
|
trusted library allocation
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
315E000
|
trusted library allocation
|
page read and write
|
||
9873000
|
unkown
|
page read and write
|
||
2FA4000
|
heap
|
page read and write
|
||
4F6B000
|
trusted library allocation
|
page read and write
|
||
7FF5ED39B000
|
unkown
|
page readonly
|
||
54C1000
|
heap
|
page read and write
|
||
3020000
|
unkown
|
page read and write
|
||
334A000
|
trusted library allocation
|
page read and write
|
||
2CA3000
|
trusted library allocation
|
page read and write
|
||
7FF5ED750000
|
unkown
|
page readonly
|
||
3860000
|
trusted library allocation
|
page read and write
|
||
308A000
|
stack
|
page read and write
|
||
3128000
|
trusted library allocation
|
page read and write
|
||
1DCCC45A000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
3166000
|
trusted library allocation
|
page read and write
|
||
C000090000
|
direct allocation
|
page read and write
|
||
7FF5ED821000
|
unkown
|
page readonly
|
||
27B0000
|
heap
|
page read and write
|
||
FE5A000
|
unkown
|
page read and write
|
||
CB1B000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
302E000
|
heap
|
page read and write
|
||
301F000
|
heap
|
page read and write
|
||
311D000
|
trusted library allocation
|
page read and write
|
||
7FF5EDA53000
|
unkown
|
page readonly
|
||
303E000
|
heap
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
F56C97E000
|
stack
|
page read and write
|
||
8EC6000
|
unkown
|
page read and write
|
||
37AC000
|
unkown
|
page read and write
|
||
7FFD9B884000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
7FF5ED674000
|
unkown
|
page readonly
|
||
3010000
|
unkown
|
page read and write
|
||
26FD000
|
stack
|
page read and write
|
||
3180000
|
trusted library allocation
|
page read and write
|
||
3050000
|
unkown
|
page read and write
|
||
4F51000
|
trusted library allocation
|
page read and write
|
||
7D80000
|
unkown
|
page read and write
|
||
7FFD9B88D000
|
trusted library allocation
|
page execute and read and write
|
||
5FF0000
|
trusted library allocation
|
page read and write
|
||
40B000
|
unkown
|
page execute read
|
||
302F000
|
heap
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
4FD4000
|
trusted library allocation
|
page read and write
|
||
2700000
|
unclassified section
|
page read and write
|
||
124000
|
trusted library allocation
|
page read and write
|
||
3037000
|
heap
|
page read and write
|
||
7FF5ED92C000
|
unkown
|
page readonly
|
||
2C31000
|
trusted library allocation
|
page read and write
|
||
2F86000
|
heap
|
page read and write
|
||
423000
|
unkown
|
page read and write
|
||
7D80000
|
unkown
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page read and write
|
||
A323000
|
unkown
|
page read and write
|
||
AA90000
|
unkown
|
page read and write
|
||
7FFD9BCB0000
|
trusted library allocation
|
page read and write
|
||
114000
|
trusted library allocation
|
page read and write
|
||
AAD1000
|
unkown
|
page read and write
|
||
2B03000
|
trusted library allocation
|
page read and write
|
||
15BD955C000
|
heap
|
page read and write
|
||
2A72000
|
trusted library allocation
|
page read and write
|
||
C54A000
|
unkown
|
page read and write
|
||
300D000
|
heap
|
page read and write
|
||
3150000
|
unkown
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
5CD0000
|
trusted library allocation
|
page read and write
|
||
2EC2C2F0000
|
heap
|
page read and write
|
||
2EC2C320000
|
trusted library section
|
page read and write
|
||
2BD4000
|
trusted library allocation
|
page read and write
|
||
4EB2000
|
trusted library allocation
|
page read and write
|
||
4F64000
|
trusted library allocation
|
page read and write
|
||
C5A0000
|
unkown
|
page read and write
|
||
26DE000
|
stack
|
page read and write
|
||
C000146000
|
direct allocation
|
page read and write
|
||
4FE3000
|
trusted library allocation
|
page read and write
|
||
7FD6CFF000
|
stack
|
page read and write
|
||
9977000
|
unkown
|
page read and write
|
||
3148000
|
trusted library allocation
|
page read and write
|
||
28F82FF0000
|
heap
|
page read and write
|
||
3011000
|
heap
|
page read and write
|
||
6CA98000
|
unkown
|
page readonly
|
||
334A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
C6F4000
|
unkown
|
page read and write
|
||
7FFD9B87B000
|
trusted library allocation
|
page read and write
|
||
C561000
|
unkown
|
page read and write
|
||
2ABA000
|
trusted library allocation
|
page read and write
|
||
7A34000
|
unkown
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
4CD0000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
3006000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
B370000
|
unkown
|
page read and write
|
||
5486000
|
trusted library allocation
|
page read and write
|
||
2BE1000
|
trusted library allocation
|
page read and write
|
||
7DF4F3040000
|
unkown
|
page readonly
|
||
3030000
|
unkown
|
page read and write
|
||
311E000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
2CE3000
|
trusted library allocation
|
page read and write
|
||
7FF5ED669000
|
unkown
|
page readonly
|
||
C0004DE000
|
direct allocation
|
page read and write
|
||
3341000
|
trusted library allocation
|
page read and write
|
||
51E6000
|
trusted library allocation
|
page read and write
|
||
20A584E5000
|
heap
|
page read and write
|
||
4E94000
|
trusted library allocation
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
7DB0000
|
unkown
|
page read and write
|
||
3153000
|
trusted library allocation
|
page read and write
|
||
9AA0000
|
unkown
|
page read and write
|
||
300D000
|
heap
|
page read and write
|
||
9ADC000
|
stack
|
page read and write
|
||
2BEE000
|
trusted library allocation
|
page read and write
|
||
3165000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
35F0000
|
trusted library allocation
|
page read and write
|
||
20A56903000
|
heap
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
3541000
|
heap
|
page read and write
|
||
5065000
|
trusted library allocation
|
page read and write
|
||
2BB7000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
2EC2F116000
|
trusted library allocation
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
440000
|
trusted library allocation
|
page read and write
|
||
2FA4000
|
heap
|
page read and write
|
||
3044000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
3113000
|
trusted library allocation
|
page read and write
|
||
76C0000
|
unkown
|
page read and write
|
||
7884000
|
unkown
|
page read and write
|
||
5E5000
|
heap
|
page read and write
|
||
2448000
|
unkown
|
page readonly
|
||
1370000
|
unkown
|
page read and write
|
||
4F74000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
2AE1000
|
trusted library allocation
|
page read and write
|
||
2A54000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
318F000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
3123000
|
trusted library allocation
|
page read and write
|
||
7FF5ED996000
|
unkown
|
page readonly
|
||
3010000
|
unkown
|
page read and write
|
||
B5AE000
|
stack
|
page read and write
|
||
9AA0000
|
unkown
|
page read and write
|
||
311B000
|
trusted library allocation
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
3165000
|
trusted library allocation
|
page read and write
|
||
7FF5ED26E000
|
unkown
|
page readonly
|
||
7FF5ED9C8000
|
unkown
|
page readonly
|
||
15BF63D0000
|
heap
|
page read and write
|
||
2BB9000
|
trusted library allocation
|
page read and write
|
||
3020000
|
unkown
|
page read and write
|
||
C00009C000
|
direct allocation
|
page read and write
|
||
2C96000
|
trusted library allocation
|
page read and write
|
||
7FF5ED625000
|
unkown
|
page readonly
|
||
2BCE000
|
trusted library allocation
|
page read and write
|
||
93BE000
|
stack
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
1DCCE571000
|
trusted library allocation
|
page read and write
|
||
7FF5ED349000
|
unkown
|
page readonly
|
||
300D000
|
heap
|
page read and write
|
||
7D90000
|
unkown
|
page read and write
|
||
120000
|
trusted library allocation
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
4F77000
|
trusted library allocation
|
page read and write
|
||
2C39000
|
trusted library allocation
|
page read and write
|
||
B6A0000
|
heap
|
page read and write
|
||
7DF44CEE0000
|
trusted library allocation
|
page execute and read and write
|
||
E79D000
|
stack
|
page read and write
|
||
37D2000
|
unkown
|
page read and write
|
||
3168000
|
trusted library allocation
|
page read and write
|
||
2C05000
|
trusted library allocation
|
page read and write
|
||
3122000
|
trusted library allocation
|
page read and write
|
||
3034000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
20A58301000
|
heap
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
2EC46113000
|
trusted library allocation
|
page read and write
|
||
4F7B000
|
trusted library allocation
|
page read and write
|
||
7852000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
A375000
|
unkown
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
7863000
|
unkown
|
page read and write
|
||
2BF2000
|
trusted library allocation
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
52AB000
|
trusted library allocation
|
page read and write
|
||
2EC2C236000
|
heap
|
page read and write
|
||
FBE4000
|
unkown
|
page read and write
|
||
504C000
|
trusted library allocation
|
page read and write
|
||
3125000
|
trusted library allocation
|
page read and write
|
||
313E000
|
trusted library allocation
|
page read and write
|
||
6CABE000
|
unkown
|
page read and write
|
||
300D000
|
heap
|
page read and write
|
||
7859000
|
unkown
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page read and write
|
||
15BDB100000
|
heap
|
page execute and read and write
|
||
38FC000
|
stack
|
page read and write
|
||
2B8A000
|
trusted library allocation
|
page read and write
|
||
A19F000
|
stack
|
page read and write
|
||
1DCE68F3000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
1DCE6A75000
|
heap
|
page read and write
|
||
BD1D000
|
stack
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
C92D000
|
unkown
|
page read and write
|
||
1483000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
3020000
|
unkown
|
page read and write
|
||
987B000
|
unkown
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
C0000A6000
|
direct allocation
|
page read and write
|
||
7FF5EDA31000
|
unkown
|
page readonly
|
||
A4AB000
|
unkown
|
page read and write
|
||
1E64A6FA000
|
heap
|
page read and write
|
||
7D00000
|
unkown
|
page readonly
|
||
2B76000
|
trusted library allocation
|
page read and write
|
||
2940000
|
heap
|
page execute and read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
2EC2C340000
|
trusted library allocation
|
page read and write
|
||
3120000
|
unkown
|
page readonly
|
||
C000079000
|
direct allocation
|
page read and write
|
||
7FF5ED451000
|
unkown
|
page readonly
|
||
9AC0000
|
unkown
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
27AF000
|
stack
|
page read and write
|
||
7FF5ED692000
|
unkown
|
page readonly
|
||
302E000
|
heap
|
page read and write
|
||
2EC2FAC9000
|
trusted library allocation
|
page read and write
|
||
A8B07FE000
|
stack
|
page read and write
|
||
AB4E000
|
unkown
|
page read and write
|
||
2CCE000
|
trusted library allocation
|
page read and write
|
||
FE41000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
4F6C000
|
trusted library allocation
|
page read and write
|
||
28EF000
|
stack
|
page read and write
|
||
335A000
|
trusted library allocation
|
page read and write
|
||
AB60000
|
unkown
|
page read and write
|
||
3040000
|
unkown
|
page read and write
|
||
7FF5ED5CE000
|
unkown
|
page readonly
|
||
2C3F000
|
trusted library allocation
|
page read and write
|
||
4F5D000
|
trusted library allocation
|
page read and write
|
||
3128000
|
trusted library allocation
|
page read and write
|
||
3050000
|
unkown
|
page read and write
|
||
2AAF000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
15BF3A30000
|
heap
|
page read and write
|
||
2660000
|
trusted library allocation
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
4B90000
|
unkown
|
page read and write
|
||
C6D8000
|
unkown
|
page read and write
|
||
410000
|
heap
|
page read and write
|
||
7D80000
|
unkown
|
page read and write
|
||
CA42000
|
unkown
|
page read and write
|
||
7FD6DFB000
|
stack
|
page read and write
|
||
2C1A000
|
trusted library allocation
|
page read and write
|
||
7FF5ED939000
|
unkown
|
page readonly
|
||
110000
|
trusted library allocation
|
page read and write
|
||
3150000
|
unkown
|
page read and write
|
||
4F96000
|
trusted library allocation
|
page read and write
|
||
3109000
|
trusted library allocation
|
page read and write
|
||
B370000
|
unkown
|
page read and write
|
||
95DC000
|
stack
|
page read and write
|
||
F56C87E000
|
stack
|
page read and write
|
||
7FF65BB44000
|
unkown
|
page write copy
|
||
7FFD9B966000
|
trusted library allocation
|
page execute and read and write
|
||
55C0000
|
heap
|
page read and write
|
||
F56DC4C000
|
stack
|
page read and write
|
||
7FFD9B89D000
|
trusted library allocation
|
page execute and read and write
|
||
C7C5000
|
unkown
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
C5A3000
|
unkown
|
page read and write
|
||
4FDE000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
7DF4F3041000
|
unkown
|
page execute read
|
||
1DCCE49D000
|
trusted library allocation
|
page read and write
|
||
214F000
|
stack
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
982D000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
1ABF35E0000
|
heap
|
page read and write
|
||
2EF6000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA11000
|
trusted library allocation
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
4FAF000
|
trusted library allocation
|
page read and write
|
||
C6C1000
|
unkown
|
page read and write
|
||
160000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
3050000
|
unkown
|
page read and write
|
||
2EC2F8B9000
|
trusted library allocation
|
page read and write
|
||
1DCCE480000
|
trusted library allocation
|
page read and write
|
||
FCA6000
|
unkown
|
page read and write
|
||
A8B0BFE000
|
stack
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
987D000
|
unkown
|
page read and write
|
||
335A000
|
trusted library allocation
|
page read and write
|
||
1ABF5170000
|
heap
|
page read and write
|
||
5040000
|
heap
|
page read and write
|
||
4E70000
|
trusted library allocation
|
page read and write
|
||
C6BF000
|
unkown
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
7D80000
|
unkown
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
C962000
|
unkown
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
3738000
|
unkown
|
page read and write
|
||
7FF5ED6DB000
|
unkown
|
page readonly
|
||
310E000
|
trusted library allocation
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
7FF764861000
|
unkown
|
page execute read
|
||
1A41B730000
|
heap
|
page read and write
|
||
2CE5000
|
trusted library allocation
|
page read and write
|
||
4F7B000
|
trusted library allocation
|
page read and write
|
||
7FF5ED71E000
|
unkown
|
page readonly
|
||
3115000
|
trusted library allocation
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
15BF3880000
|
heap
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
1A460CA0000
|
direct allocation
|
page read and write
|
||
3125000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
A37D000
|
unkown
|
page read and write
|
||
2F9E000
|
heap
|
page read and write
|
||
F56DBCD000
|
stack
|
page read and write
|
||
2EC2F93B000
|
trusted library allocation
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
7FF5ED503000
|
unkown
|
page readonly
|
||
20A5690C000
|
heap
|
page read and write
|
||
7FF5ED3D0000
|
unkown
|
page readonly
|
||
2A78000
|
trusted library allocation
|
page read and write
|
||
1DCE80E0000
|
heap
|
page read and write
|
||
7FF5ED412000
|
unkown
|
page readonly
|
||
4EA6000
|
trusted library allocation
|
page read and write
|
||
87BE000
|
stack
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
2ABE000
|
trusted library allocation
|
page read and write
|
||
3134000
|
trusted library allocation
|
page read and write
|
||
C00009A000
|
direct allocation
|
page read and write
|
||
379F000
|
stack
|
page read and write
|
||
26BA000
|
stack
|
page read and write
|
||
3020000
|
heap
|
page read and write
|
||
A310000
|
unkown
|
page read and write
|
||
2CA7000
|
trusted library allocation
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
3040000
|
unkown
|
page read and write
|
||
B370000
|
unkown
|
page read and write
|
||
30FF000
|
stack
|
page read and write
|
||
4F49000
|
trusted library allocation
|
page read and write
|
||
F56CEBB000
|
stack
|
page read and write
|
||
300D000
|
heap
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
7FF5ED4EF000
|
unkown
|
page readonly
|
||
2BBA000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
7FF65BBE5000
|
unkown
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
313F000
|
trusted library allocation
|
page read and write
|
||
A433000
|
unkown
|
page read and write
|
||
3410000
|
unkown
|
page read and write
|
||
2F8B000
|
heap
|
page read and write
|
||
2EC4650E000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
3050000
|
unkown
|
page read and write
|
||
7FF5ED62F000
|
unkown
|
page readonly
|
||
7FF5ED3CE000
|
unkown
|
page readonly
|
||
3348000
|
trusted library allocation
|
page read and write
|
||
3961000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
2C1C000
|
trusted library allocation
|
page read and write
|
||
A4A1000
|
unkown
|
page read and write
|
||
7FF5ED43A000
|
unkown
|
page readonly
|
||
B330000
|
unkown
|
page read and write
|
||
190000
|
trusted library allocation
|
page read and write
|
||
3122000
|
trusted library allocation
|
page read and write
|
||
C563000
|
unkown
|
page read and write
|
||
A327000
|
unkown
|
page read and write
|
||
7FF5ED48A000
|
unkown
|
page readonly
|
||
20A56916000
|
heap
|
page read and write
|
||
7DB0000
|
unkown
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7FF5ED779000
|
unkown
|
page readonly
|
||
7FF5ED961000
|
unkown
|
page readonly
|
||
20A568A9000
|
heap
|
page read and write
|
||
7FF5ED9E1000
|
unkown
|
page readonly
|
||
A4FC000
|
unkown
|
page read and write
|
||
E71E000
|
stack
|
page read and write
|
||
89C0000
|
unkown
|
page read and write
|
||
1DCCC644000
|
trusted library section
|
page readonly
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
7D90000
|
unkown
|
page read and write
|
||
2BA8000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
B370000
|
unkown
|
page read and write
|
||
313D000
|
trusted library allocation
|
page read and write
|
||
AF8D000
|
stack
|
page read and write
|
||
31A8000
|
trusted library allocation
|
page read and write
|
||
7DB0000
|
unkown
|
page read and write
|
||
C000002000
|
direct allocation
|
page read and write
|
||
B370000
|
unkown
|
page read and write
|
||
2EC2E4A2000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
2EC2E150000
|
trusted library allocation
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
6040000
|
trusted library allocation
|
page read and write
|
||
51BF000
|
stack
|
page read and write
|
||
3358000
|
trusted library allocation
|
page read and write
|
||
A8B5D8D000
|
stack
|
page read and write
|
||
7FFD9BAF2000
|
trusted library allocation
|
page read and write
|
||
7DB0000
|
unkown
|
page read and write
|
||
3150000
|
unkown
|
page read and write
|
||
3047000
|
heap
|
page read and write
|
||
15BD955F000
|
heap
|
page read and write
|
||
3136000
|
trusted library allocation
|
page read and write
|
||
2B61000
|
trusted library allocation
|
page read and write
|
||
1510000
|
unkown
|
page readonly
|
||
7D90000
|
unkown
|
page read and write
|
||
316C000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
1A41B650000
|
heap
|
page read and write
|
||
3050000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7FF65C256000
|
unkown
|
page readonly
|
||
7FF5ED4E8000
|
unkown
|
page readonly
|
||
5BE000
|
stack
|
page read and write
|
||
9B10000
|
unkown
|
page read and write
|
||
3350000
|
trusted library allocation
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
3148000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA22000
|
trusted library allocation
|
page read and write
|
||
9E6C000
|
stack
|
page read and write
|
||
7F40000
|
unkown
|
page readonly
|
||
259E000
|
stack
|
page read and write
|
||
1DCCC690000
|
heap
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
7FF5ED9BE000
|
unkown
|
page readonly
|
||
3125000
|
trusted library allocation
|
page read and write
|
||
5041000
|
heap
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
C000166000
|
direct allocation
|
page read and write
|
||
2BBD000
|
trusted library allocation
|
page read and write
|
||
7FF764861000
|
unkown
|
page execute read
|
||
423000
|
unkown
|
page write copy
|
||
2AF6000
|
trusted library allocation
|
page read and write
|
||
C000136000
|
direct allocation
|
page read and write
|
||
1DCCE4E2000
|
trusted library allocation
|
page read and write
|
||
2B32000
|
trusted library allocation
|
page read and write
|
||
2AB8000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
9D64000
|
unkown
|
page read and write
|
||
2B0D000
|
trusted library allocation
|
page read and write
|
||
2EC2E48B000
|
trusted library allocation
|
page read and write
|
||
2B95000
|
trusted library allocation
|
page read and write
|
||
7FF5ED445000
|
unkown
|
page readonly
|
||
2AF2000
|
trusted library allocation
|
page read and write
|
||
2A6E000
|
trusted library allocation
|
page read and write
|
||
C00015C000
|
direct allocation
|
page read and write
|
||
B629000
|
stack
|
page read and write
|
||
4F4F000
|
trusted library allocation
|
page read and write
|
||
335A000
|
trusted library allocation
|
page read and write
|
||
4F64000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
2F9F000
|
heap
|
page read and write
|
||
40B000
|
unkown
|
page execute read
|
||
420000
|
heap
|
page read and write
|
||
3150000
|
unkown
|
page read and write
|
||
AB49000
|
unkown
|
page read and write
|
||
314F000
|
trusted library allocation
|
page read and write
|
||
3155000
|
trusted library allocation
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
4F3F000
|
stack
|
page read and write
|
||
7FF65B6B0000
|
unkown
|
page readonly
|
||
2710000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
3040000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
2BB2000
|
trusted library allocation
|
page read and write
|
||
CBBA000
|
unkown
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
2AD5000
|
trusted library allocation
|
page read and write
|
||
91B9000
|
stack
|
page read and write
|
||
2A8B000
|
trusted library allocation
|
page read and write
|
||
3148000
|
trusted library allocation
|
page read and write
|
||
2EC2EF1E000
|
trusted library allocation
|
page read and write
|
||
2A1E000
|
trusted library allocation
|
page read and write
|
||
437000
|
heap
|
page read and write
|
||
4F94000
|
trusted library allocation
|
page read and write
|
||
2AE3000
|
trusted library allocation
|
page read and write
|
||
C0000BE000
|
direct allocation
|
page read and write
|
||
1DCCE060000
|
heap
|
page read and write
|
||
2C1C000
|
trusted library allocation
|
page read and write
|
||
4FDE000
|
trusted library allocation
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
4C34000
|
unkown
|
page read and write
|
||
2EC2F767000
|
trusted library allocation
|
page read and write
|
||
7DF4F3061000
|
unkown
|
page execute read
|
||
3030000
|
unkown
|
page read and write
|
||
15BF3A10000
|
trusted library allocation
|
page read and write
|
||
4BE3000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
36F0000
|
unkown
|
page readonly
|
||
7FF5ED505000
|
unkown
|
page readonly
|
||
3170000
|
unkown
|
page read and write
|
||
15BD95C5000
|
heap
|
page read and write
|
||
B370000
|
unkown
|
page read and write
|
||
1A460B5A000
|
direct allocation
|
page read and write
|
||
2B2C000
|
trusted library allocation
|
page read and write
|
||
7FF65BB46000
|
unkown
|
page read and write
|
||
7FFD9BDD0000
|
trusted library allocation
|
page execute and read and write
|
||
9138000
|
stack
|
page read and write
|
||
7FF5ED3A7000
|
unkown
|
page readonly
|
||
A8B6D8D000
|
stack
|
page read and write
|
||
3364000
|
trusted library allocation
|
page read and write
|
||
4F61000
|
trusted library allocation
|
page read and write
|
||
2EC2F8C9000
|
trusted library allocation
|
page read and write
|
||
318F000
|
trusted library allocation
|
page read and write
|
||
C000086000
|
direct allocation
|
page read and write
|
||
7DF4F3050000
|
unkown
|
page readonly
|
||
369E000
|
stack
|
page read and write
|
||
7FF65C219000
|
unkown
|
page read and write
|
||
7FF5ED806000
|
unkown
|
page readonly
|
||
B330000
|
unkown
|
page read and write
|
||
FE74000
|
unkown
|
page read and write
|
||
7FF4094A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5ED97A000
|
unkown
|
page readonly
|
||
C6F8000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
B370000
|
unkown
|
page read and write
|
||
22966310000
|
heap
|
page read and write
|
||
787C000
|
unkown
|
page read and write
|
||
2554000
|
heap
|
page read and write
|
||
6020000
|
trusted library allocation
|
page read and write
|
||
B10D000
|
stack
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
3123000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
2A4E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
7FF65B6B1000
|
unkown
|
page execute read
|
||
2B84000
|
trusted library allocation
|
page read and write
|
||
C000296000
|
direct allocation
|
page read and write
|
||
2BEA000
|
trusted library allocation
|
page read and write
|
||
9B00000
|
unkown
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
7FF5EDA47000
|
unkown
|
page readonly
|
||
311E000
|
trusted library allocation
|
page read and write
|
||
C0000A4000
|
direct allocation
|
page read and write
|
||
2A6C000
|
trusted library allocation
|
page read and write
|
||
2B7C000
|
trusted library allocation
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
4E8B000
|
trusted library allocation
|
page read and write
|
||
7FF65BBD0000
|
unkown
|
page write copy
|
||
2CC8000
|
trusted library allocation
|
page read and write
|
||
8FB9000
|
stack
|
page read and write
|
||
1DCE986B000
|
heap
|
page read and write
|
||
2B4A000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
1E64A6D0000
|
heap
|
page read and write
|
||
986B000
|
unkown
|
page read and write
|
||
7FFD9B862000
|
trusted library allocation
|
page read and write
|
||
2C08000
|
trusted library allocation
|
page read and write
|
||
57D0000
|
trusted library allocation
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
180000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
3150000
|
unkown
|
page read and write
|
||
7FF5ECED2000
|
unkown
|
page readonly
|
||
3628000
|
trusted library allocation
|
page read and write
|
||
B370000
|
unkown
|
page read and write
|
||
2530000
|
heap
|
page read and write
|
||
615000
|
heap
|
page read and write
|
||
3155000
|
trusted library allocation
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
2EC46812000
|
heap
|
page read and write
|
||
1A460B10000
|
direct allocation
|
page read and write
|
||
3401000
|
unkown
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
2EC46136000
|
heap
|
page execute and read and write
|
||
9AA0000
|
unkown
|
page read and write
|
||
5FF0000
|
trusted library allocation
|
page read and write
|
||
7FF764860000
|
unkown
|
page readonly
|
||
2721000
|
unclassified section
|
page execute read
|
||
3030000
|
unkown
|
page read and write
|
||
C00004B000
|
direct allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
316C000
|
trusted library allocation
|
page read and write
|
||
6CA60000
|
unkown
|
page readonly
|
||
8720000
|
unkown
|
page readonly
|
||
2F70000
|
heap
|
page read and write
|
||
2A14000
|
trusted library allocation
|
page read and write
|
||
48FD000
|
stack
|
page read and write
|
||
2640000
|
trusted library allocation
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
9B00000
|
stack
|
page read and write
|
||
5F9000
|
heap
|
page read and write
|
||
7FF5ED519000
|
unkown
|
page readonly
|
||
335A000
|
trusted library allocation
|
page read and write
|
||
54C0000
|
heap
|
page read and write
|
||
3ABB3FD000
|
stack
|
page read and write
|
||
4F63000
|
trusted library allocation
|
page read and write
|
||
2C5F000
|
trusted library allocation
|
page read and write
|
||
300D000
|
heap
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
4F5C000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
C0001C4000
|
direct allocation
|
page read and write
|
||
56C3000
|
unkown
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
C0000D0000
|
direct allocation
|
page read and write
|
||
5CD0000
|
remote allocation
|
page read and write
|
||
4E9E000
|
trusted library allocation
|
page read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
A3BE000
|
unkown
|
page read and write
|
||
7FF5ED94A000
|
unkown
|
page readonly
|
||
1370000
|
unkown
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
7FF5EDA2A000
|
unkown
|
page readonly
|
||
1370000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
7FFD9BD40000
|
trusted library allocation
|
page read and write
|
||
6CA3C000
|
unkown
|
page write copy
|
||
3359000
|
trusted library allocation
|
page read and write
|
||
15BD9614000
|
heap
|
page read and write
|
||
26F0000
|
trusted library allocation
|
page read and write
|
||
6CB000
|
stack
|
page read and write
|
||
F56CDBE000
|
stack
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
7FF5ED2A9000
|
unkown
|
page readonly
|
||
1370000
|
unkown
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page read and write
|
||
C41F000
|
stack
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
7FF5ED3F3000
|
unkown
|
page readonly
|
||
7D90000
|
unkown
|
page read and write
|
||
15BDAF50000
|
heap
|
page read and write
|
||
20A58400000
|
heap
|
page read and write
|
||
7DF44CEF0000
|
trusted library allocation
|
page execute and read and write
|
||
3037000
|
heap
|
page read and write
|
||
431000
|
unkown
|
page read and write
|
||
2B66000
|
trusted library allocation
|
page read and write
|
||
7FF5ED814000
|
unkown
|
page readonly
|
||
7DF4F3051000
|
unkown
|
page execute read
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
7FF5ED39E000
|
unkown
|
page readonly
|
||
585000
|
heap
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
54C1000
|
heap
|
page read and write
|
||
4250000
|
heap
|
page read and write
|
||
7D80000
|
unkown
|
page read and write
|
||
298E000
|
stack
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
7FD68F7000
|
stack
|
page read and write
|
||
C0003BC000
|
direct allocation
|
page read and write
|
||
3176000
|
trusted library allocation
|
page read and write
|
||
2A42000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCC0000
|
trusted library allocation
|
page execute and read and write
|
||
C000096000
|
direct allocation
|
page read and write
|
||
4F52000
|
trusted library allocation
|
page read and write
|
||
25B0000
|
heap
|
page read and write
|
||
7D90000
|
unkown
|
page read and write
|
||
2D50000
|
remote allocation
|
page read and write
|
||
7FF65BB45000
|
unkown
|
page write copy
|
||
275A5170000
|
heap
|
page read and write
|
||
7FF5ED850000
|
unkown
|
page readonly
|
||
2CB3000
|
trusted library allocation
|
page read and write
|
||
7FF5ED9B8000
|
unkown
|
page readonly
|
||
2C18000
|
trusted library allocation
|
page read and write
|
||
333E000
|
stack
|
page read and write
|
||
2C6B000
|
trusted library allocation
|
page read and write
|
||
28F8300B000
|
heap
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
5A8E000
|
stack
|
page read and write
|
||
3352000
|
trusted library allocation
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
3168000
|
trusted library allocation
|
page read and write
|
||
4F49000
|
trusted library allocation
|
page read and write
|
||
9869000
|
unkown
|
page read and write
|
||
430000
|
heap
|
page read and write
|
||
7FF5ED7CF000
|
unkown
|
page readonly
|
||
1F4E000
|
stack
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
2CC6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B936000
|
trusted library allocation
|
page read and write
|
||
2B0F000
|
trusted library allocation
|
page read and write
|
||
A8AFCAF000
|
stack
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
3116000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8AD000
|
trusted library allocation
|
page execute and read and write
|
||
5290000
|
heap
|
page read and write
|
||
41F000
|
unkown
|
page readonly
|
||
C700000
|
unkown
|
page read and write
|
||
B370000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3350000
|
trusted library allocation
|
page read and write
|
||
57C0000
|
trusted library allocation
|
page read and write
|
||
C000184000
|
direct allocation
|
page read and write
|
||
2A68000
|
trusted library allocation
|
page read and write
|
||
2C37000
|
trusted library allocation
|
page read and write
|
||
5D00000
|
heap
|
page read and write
|
||
2ADD000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
7FF5ED55F000
|
unkown
|
page readonly
|
||
2EC2C370000
|
heap
|
page readonly
|
||
4CB0000
|
unkown
|
page read and write
|
||
2CAD000
|
trusted library allocation
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
7FF5ED933000
|
unkown
|
page readonly
|
||
4F58000
|
trusted library allocation
|
page read and write
|
||
3040000
|
unkown
|
page read and write
|
||
31B0000
|
trusted library allocation
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
8B60000
|
unkown
|
page readonly
|
||
3137000
|
trusted library allocation
|
page read and write
|
||
CB46000
|
unkown
|
page read and write
|
||
3048000
|
heap
|
page read and write
|
||
396A000
|
trusted library allocation
|
page read and write
|
||
4EC0000
|
trusted library allocation
|
page read and write
|
||
2AC5000
|
trusted library allocation
|
page read and write
|
||
5FD000
|
heap
|
page read and write
|
||
786B000
|
unkown
|
page read and write
|
||
7C80000
|
unkown
|
page read and write
|
||
C000028000
|
direct allocation
|
page read and write
|
||
1DCCC6B0000
|
trusted library allocation
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
4FCF000
|
trusted library allocation
|
page read and write
|
||
F56CC3C000
|
stack
|
page read and write
|
||
7FF764952000
|
unkown
|
page write copy
|
||
6000000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
303E000
|
heap
|
page read and write
|
||
3795000
|
unkown
|
page read and write
|
||
7FFD9BCC2000
|
trusted library allocation
|
page read and write
|
||
3341000
|
trusted library allocation
|
page read and write
|
||
5D01000
|
heap
|
page read and write
|
||
3065000
|
heap
|
page read and write
|
||
4FA2000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
7DB0000
|
unkown
|
page read and write
|
||
2EC2C380000
|
trusted library allocation
|
page read and write
|
||
3549000
|
trusted library allocation
|
page read and write
|
||
1DCCDFD0000
|
heap
|
page execute and read and write
|
||
334E000
|
trusted library allocation
|
page read and write
|
||
2CAF000
|
trusted library allocation
|
page read and write
|
||
2B3F000
|
stack
|
page read and write
|
||
1A460B41000
|
direct allocation
|
page read and write
|
||
266B000
|
trusted library allocation
|
page execute and read and write
|
||
315F000
|
trusted library allocation
|
page read and write
|
||
A32A000
|
unkown
|
page read and write
|
||
3128000
|
trusted library allocation
|
page read and write
|
||
3016000
|
heap
|
page read and write
|
||
C00010E000
|
direct allocation
|
page read and write
|
||
F56DCCE000
|
stack
|
page read and write
|
||
5E00000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
7FF5ED433000
|
unkown
|
page readonly
|
||
7D80000
|
unkown
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
7DB0000
|
unkown
|
page read and write
|
||
7FFD9B893000
|
trusted library allocation
|
page read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
507D000
|
trusted library allocation
|
page read and write
|
||
4E20000
|
trusted library allocation
|
page read and write
|
||
1DCCC260000
|
unkown
|
page readonly
|
||
4FDE000
|
trusted library allocation
|
page read and write
|
||
27C3000
|
trusted library allocation
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
2C02000
|
trusted library allocation
|
page read and write
|
||
5FE0000
|
trusted library allocation
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
9AA0000
|
unkown
|
page read and write
|
||
C0000C4000
|
direct allocation
|
page read and write
|
||
A37B000
|
unkown
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
2BE9000
|
trusted library allocation
|
page read and write
|
||
5F9000
|
heap
|
page read and write
|
||
3037000
|
heap
|
page read and write
|
||
B8C0000
|
unkown
|
page readonly
|
||
3460000
|
unkown
|
page read and write
|
||
2A7F000
|
trusted library allocation
|
page read and write
|
||
797D000
|
unkown
|
page read and write
|
||
2EC2E501000
|
trusted library allocation
|
page read and write
|
||
3038000
|
heap
|
page read and write
|
||
2B2F000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
7FF5ED9A1000
|
unkown
|
page readonly
|
||
4F83000
|
trusted library allocation
|
page read and write
|
||
303C000
|
heap
|
page read and write
|
||
3047000
|
heap
|
page read and write
|
||
2B15000
|
trusted library allocation
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
8860000
|
unkown
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
302B000
|
heap
|
page read and write
|
||
311E000
|
trusted library allocation
|
page read and write
|
||
3165000
|
trusted library allocation
|
page read and write
|
||
5CB4000
|
trusted library allocation
|
page read and write
|
||
1A41B790000
|
direct allocation
|
page read and write
|
||
14B000
|
trusted library allocation
|
page execute and read and write
|
||
2EC2F95F000
|
trusted library allocation
|
page read and write
|
||
3450000
|
unkown
|
page read and write
|
||
300D000
|
heap
|
page read and write
|
||
20A584E0000
|
heap
|
page read and write
|
||
275A5314000
|
heap
|
page read and write
|
||
C4A0000
|
unkown
|
page read and write
|
||
A8B2FFE000
|
stack
|
page read and write
|
||
A391000
|
unkown
|
page read and write
|
||
3044000
|
heap
|
page read and write
|
||
3166000
|
trusted library allocation
|
page read and write
|
||
2BF1000
|
trusted library allocation
|
page read and write
|
||
1ABF35D0000
|
heap
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
3020000
|
unkown
|
page read and write
|
||
7FF5ED77E000
|
unkown
|
page readonly
|
||
7FFD9BA80000
|
trusted library allocation
|
page execute and read and write
|
||
7FF65BBCD000
|
unkown
|
page read and write
|
||
5475000
|
trusted library allocation
|
page read and write
|
||
54C1000
|
heap
|
page read and write
|
||
2A8F000
|
trusted library allocation
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
15BF63DA000
|
heap
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
3168000
|
trusted library allocation
|
page read and write
|
||
2EC2F962000
|
trusted library allocation
|
page read and write
|
||
2BA0000
|
trusted library allocation
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
97AD000
|
unkown
|
page read and write
|
||
229663BC000
|
heap
|
page read and write
|
||
3137000
|
trusted library allocation
|
page read and write
|
||
3050000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7FF5ED404000
|
unkown
|
page readonly
|
||
8EE000
|
stack
|
page read and write
|
||
1A41B7A8000
|
heap
|
page read and write
|
||
354F000
|
trusted library allocation
|
page read and write
|
||
7FF5EDA70000
|
unkown
|
page readonly
|
||
5FA000
|
heap
|
page read and write
|
||
9DED000
|
stack
|
page read and write
|
||
57C0000
|
trusted library allocation
|
page read and write
|
||
1DCCE4AF000
|
trusted library allocation
|
page read and write
|
||
275A54BE000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
C0000CC000
|
direct allocation
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
1DCCC540000
|
heap
|
page read and write
|
||
310B000
|
trusted library allocation
|
page read and write
|
||
4E90000
|
trusted library allocation
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
FE10000
|
unkown
|
page read and write
|
||
2B37000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
1DCCC655000
|
heap
|
page read and write
|
||
3037000
|
heap
|
page read and write
|
||
7DB0000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
4E86000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
3020000
|
unkown
|
page read and write
|
||
C0000C8000
|
direct allocation
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
15BD98D0000
|
heap
|
page read and write
|
||
3EA5000
|
trusted library allocation
|
page read and write
|
||
C557000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
C000172000
|
direct allocation
|
page read and write
|
||
2EC2F935000
|
trusted library allocation
|
page read and write
|
||
7FF5EDA76000
|
unkown
|
page readonly
|
||
304F000
|
heap
|
page read and write
|
||
7D90000
|
unkown
|
page read and write
|
||
7FF5ED265000
|
unkown
|
page readonly
|
||
C000046000
|
direct allocation
|
page read and write
|
||
3758000
|
unkown
|
page read and write
|
||
3348000
|
trusted library allocation
|
page read and write
|
||
2ADB000
|
trusted library allocation
|
page read and write
|
||
C00003D000
|
direct allocation
|
page read and write
|
||
C000800000
|
direct allocation
|
page read and write
|
||
7FF5ED7D6000
|
unkown
|
page readonly
|
||
2C6D000
|
trusted library allocation
|
page read and write
|
||
3352000
|
trusted library allocation
|
page read and write
|
||
7D90000
|
unkown
|
page read and write
|
||
7FF5ED781000
|
unkown
|
page readonly
|
||
27CC000
|
trusted library allocation
|
page execute and read and write
|
||
2C6F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B863000
|
trusted library allocation
|
page execute and read and write
|
||
315E000
|
trusted library allocation
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
37A8000
|
unkown
|
page read and write
|
||
A21E000
|
stack
|
page read and write
|
||
4FE1000
|
trusted library allocation
|
page read and write
|
||
7FF65BB50000
|
unkown
|
page read and write
|
||
5F9000
|
heap
|
page read and write
|
||
2B52000
|
trusted library allocation
|
page read and write
|
||
2C2F000
|
trusted library allocation
|
page read and write
|
||
7FF5ED7E9000
|
unkown
|
page readonly
|
||
2CB1000
|
trusted library allocation
|
page read and write
|
||
3011000
|
heap
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
7FF5ED9CC000
|
unkown
|
page readonly
|
||
2750000
|
heap
|
page read and write
|
||
C000332000
|
direct allocation
|
page read and write
|
||
6000000
|
trusted library allocation
|
page read and write
|
||
7FF7648ED000
|
unkown
|
page readonly
|
||
C0001CA000
|
direct allocation
|
page read and write
|
||
2C71000
|
trusted library allocation
|
page read and write
|
||
3580000
|
trusted library allocation
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
F56C7FE000
|
stack
|
page read and write
|
||
E59D000
|
stack
|
page read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
20A56900000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
3379000
|
trusted library allocation
|
page read and write
|
||
3032000
|
heap
|
page read and write
|
||
334A000
|
trusted library allocation
|
page read and write
|
||
7FF5ED644000
|
unkown
|
page readonly
|
||
2AC6000
|
trusted library allocation
|
page read and write
|
||
7D80000
|
unkown
|
page read and write
|
||
298F000
|
stack
|
page read and write
|
||
F56DACC000
|
stack
|
page read and write
|
||
4F9B000
|
trusted library allocation
|
page read and write
|
||
3341000
|
trusted library allocation
|
page read and write
|
||
7861000
|
unkown
|
page read and write
|
||
7FF5ED4C2000
|
unkown
|
page readonly
|
||
3420000
|
unkown
|
page read and write
|
||
4F7B000
|
trusted library allocation
|
page read and write
|
||
A8B47FE000
|
stack
|
page read and write
|
||
4F48000
|
trusted library allocation
|
page read and write
|
||
B981FF000
|
stack
|
page read and write
|
||
4F4B000
|
trusted library allocation
|
page read and write
|
||
2B97000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
1DCCC520000
|
heap
|
page read and write
|
||
2BD9000
|
trusted library allocation
|
page read and write
|
||
98A8000
|
unkown
|
page read and write
|
||
7FD69FE000
|
stack
|
page read and write
|
||
6CA4E000
|
unkown
|
page read and write
|
||
2EC2C234000
|
heap
|
page read and write
|
||
7FFD9BA42000
|
trusted library allocation
|
page read and write
|
||
7FF5EDA38000
|
unkown
|
page readonly
|
||
3990000
|
heap
|
page read and write
|
||
7FFD9BD50000
|
trusted library allocation
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
36D3000
|
stack
|
page read and write
|
||
23DC000
|
stack
|
page read and write
|
||
6010000
|
direct allocation
|
page execute and read and write
|
||
300D000
|
heap
|
page read and write
|
||
3042000
|
heap
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
3129000
|
trusted library allocation
|
page read and write
|
||
7FF5ED872000
|
unkown
|
page readonly
|
||
3100000
|
trusted library allocation
|
page read and write
|
||
4F83000
|
trusted library allocation
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page read and write
|
||
55C0000
|
heap
|
page read and write
|
||
2C09000
|
trusted library allocation
|
page read and write
|
||
3020000
|
heap
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
2C42000
|
trusted library allocation
|
page read and write
|
||
2EC3E0F1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCD0000
|
trusted library allocation
|
page read and write
|
||
29FF000
|
trusted library allocation
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
4E60000
|
trusted library allocation
|
page read and write
|
||
1DCE9868000
|
heap
|
page read and write
|
||
2EC2F947000
|
trusted library allocation
|
page read and write
|
||
3025000
|
heap
|
page read and write
|
||
2D50000
|
remote allocation
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
9687000
|
unkown
|
page read and write
|
||
C000272000
|
direct allocation
|
page read and write
|
||
7FFD9BA69000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDF0000
|
trusted library allocation
|
page read and write
|
||
B370000
|
unkown
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
2662000
|
trusted library allocation
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
3165000
|
trusted library allocation
|
page read and write
|
||
1387000
|
unkown
|
page read and write
|
||
4F9D000
|
trusted library allocation
|
page read and write
|
||
2A1C000
|
trusted library allocation
|
page read and write
|
||
2EC46410000
|
trusted library allocation
|
page read and write
|
||
2700000
|
remote allocation
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
2A56000
|
trusted library allocation
|
page read and write
|
||
2B99000
|
trusted library allocation
|
page read and write
|
||
2680000
|
heap
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
3050000
|
unkown
|
page read and write
|
||
7FF5ED42B000
|
unkown
|
page readonly
|
||
2EC2C2F5000
|
heap
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
3860000
|
direct allocation
|
page execute and read and write
|
||
3420000
|
unkown
|
page read and write
|
||
C000057000
|
direct allocation
|
page read and write
|
||
2B69000
|
trusted library allocation
|
page read and write
|
||
311D000
|
trusted library allocation
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
9885000
|
unkown
|
page read and write
|
||
4F44000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3040000
|
unkown
|
page read and write
|
||
B729000
|
stack
|
page read and write
|
||
3350000
|
trusted library allocation
|
page read and write
|
||
C0003AA000
|
direct allocation
|
page read and write
|
||
2AF0000
|
trusted library allocation
|
page read and write
|
||
2B2D000
|
trusted library allocation
|
page read and write
|
||
9AA0000
|
unkown
|
page read and write
|
||
303E000
|
heap
|
page read and write
|
||
2EC2EBE8000
|
trusted library allocation
|
page read and write
|
||
B985FF000
|
stack
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
CA63000
|
unkown
|
page read and write
|
||
B150000
|
unkown
|
page read and write
|
||
4F5B000
|
trusted library allocation
|
page read and write
|
||
A49E000
|
unkown
|
page read and write
|
||
19F000
|
stack
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
7DF4F3071000
|
unkown
|
page execute read
|
||
C503000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
7FF5ED5C5000
|
unkown
|
page readonly
|
||
43BC000
|
trusted library allocation
|
page read and write
|
||
303C000
|
heap
|
page read and write
|
||
313D000
|
trusted library allocation
|
page read and write
|
||
5ED000
|
heap
|
page read and write
|
||
217E000
|
stack
|
page read and write
|
||
7FFD9B91C000
|
trusted library allocation
|
page execute and read and write
|
||
3030000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
2EC2C232000
|
heap
|
page read and write
|
||
4F41000
|
trusted library allocation
|
page read and write
|
||
7D80000
|
unkown
|
page read and write
|
||
257E000
|
heap
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
7FD62FA000
|
stack
|
page read and write
|
||
7FF65BB51000
|
unkown
|
page write copy
|
||
89E0000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
A8B3BFB000
|
stack
|
page read and write
|
||
4F73000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
7FFD9B8DC000
|
trusted library allocation
|
page execute and read and write
|
||
5E0000
|
heap
|
page read and write
|
||
F0000
|
trusted library section
|
page read and write
|
||
304E000
|
heap
|
page read and write
|
||
2EC467B5000
|
heap
|
page read and write
|
||
2633000
|
trusted library allocation
|
page execute and read and write
|
||
2B19000
|
trusted library allocation
|
page read and write
|
||
B370000
|
unkown
|
page read and write
|
||
7FF5ED3D6000
|
unkown
|
page readonly
|
||
E99F000
|
stack
|
page read and write
|
||
7FF5ED660000
|
unkown
|
page readonly
|
||
300D000
|
heap
|
page read and write
|
||
4EF0000
|
trusted library allocation
|
page read and write
|
||
2FDA000
|
heap
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
28F84B40000
|
heap
|
page read and write
|
||
335A000
|
trusted library allocation
|
page read and write
|
||
3050000
|
unkown
|
page read and write
|
||
7D90000
|
unkown
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
6CABE000
|
unkown
|
page read and write
|
||
7FF65C22A000
|
unkown
|
page write copy
|
||
1A460BB3000
|
direct allocation
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
2C3B000
|
trusted library allocation
|
page read and write
|
||
7FF5ED59E000
|
unkown
|
page readonly
|
||
1370000
|
unkown
|
page read and write
|
||
7FF65C226000
|
unkown
|
page write copy
|
||
3050000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
2790000
|
trusted library allocation
|
page read and write
|
||
5CD0000
|
remote allocation
|
page read and write
|
||
3026000
|
heap
|
page read and write
|
||
7FF5ED810000
|
unkown
|
page readonly
|
||
29FB000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
7FF5ED50A000
|
unkown
|
page readonly
|
||
C0001A0000
|
direct allocation
|
page read and write
|
||
B08D000
|
stack
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
60B11CB000
|
stack
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
3134000
|
trusted library allocation
|
page read and write
|
||
8CEB000
|
stack
|
page read and write
|
||
8D6D000
|
stack
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
3020000
|
unkown
|
page read and write
|
||
3034000
|
heap
|
page read and write
|
||
40A0000
|
unclassified section
|
page read and write
|
||
3020000
|
unkown
|
page read and write
|
||
C84D000
|
unkown
|
page read and write
|
||
334F000
|
trusted library allocation
|
page read and write
|
||
2C44000
|
trusted library allocation
|
page read and write
|
||
2BBE000
|
trusted library allocation
|
page read and write
|
||
CA12000
|
unkown
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
C0001A8000
|
direct allocation
|
page read and write
|
||
37AE000
|
unkown
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
B170000
|
unkown
|
page readonly
|
||
1370000
|
unkown
|
page read and write
|
||
56A000
|
heap
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
3618000
|
trusted library allocation
|
page read and write
|
||
C000156000
|
direct allocation
|
page read and write
|
||
590F000
|
stack
|
page read and write
|
||
4C50000
|
unkown
|
page read and write
|
||
3345000
|
trusted library allocation
|
page read and write
|
||
2B2E000
|
trusted library allocation
|
page read and write
|
||
3FDE000
|
unclassified section
|
page readonly
|
||
3129000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
2BE8000
|
trusted library allocation
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
B370000
|
unkown
|
page read and write
|
||
313C000
|
trusted library allocation
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
7FF5ED4F3000
|
unkown
|
page readonly
|
||
6000000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page execute and read and write
|
||
4FB4000
|
trusted library allocation
|
page read and write
|
||
7FE08000
|
trusted library allocation
|
page execute and read and write
|
||
2D75000
|
heap
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
2BCD000
|
trusted library allocation
|
page read and write
|
||
7FF5ED4DF000
|
unkown
|
page readonly
|
||
313D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page execute and read and write
|
||
2BDB000
|
trusted library allocation
|
page read and write
|
||
3130000
|
trusted library allocation
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
C00004D000
|
direct allocation
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
11B0000
|
unkown
|
page readonly
|
||
3112000
|
trusted library allocation
|
page read and write
|
||
B370000
|
unkown
|
page read and write
|
||
263D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5ED697000
|
unkown
|
page readonly
|
||
3040000
|
unkown
|
page read and write
|
||
2B80000
|
trusted library allocation
|
page read and write
|
||
7FF65BBCF000
|
unkown
|
page read and write
|
||
6130000
|
heap
|
page read and write
|
||
8DA0000
|
unkown
|
page read and write
|
||
278E000
|
stack
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
100000
|
direct allocation
|
page read and write
|
||
7FFD9BDC0000
|
trusted library allocation
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
316C000
|
trusted library allocation
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
2EC2E4BE000
|
trusted library allocation
|
page read and write
|
||
3040000
|
unkown
|
page read and write
|
||
1DCDE138000
|
trusted library allocation
|
page read and write
|
||
4F6B000
|
trusted library allocation
|
page read and write
|
||
BD98000
|
stack
|
page read and write
|
||
E61E000
|
stack
|
page read and write
|
||
B370000
|
unkown
|
page read and write
|
||
4F86000
|
trusted library allocation
|
page read and write
|
||
315D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
4FB1000
|
trusted library allocation
|
page read and write
|
||
1DCCC310000
|
heap
|
page read and write
|
||
7FF65C18D000
|
unkown
|
page read and write
|
||
C000309000
|
direct allocation
|
page read and write
|
||
3042000
|
heap
|
page read and write
|
||
1DCE982D000
|
heap
|
page read and write
|
||
25A3000
|
heap
|
page read and write
|
||
7FFD9B882000
|
trusted library allocation
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
3047000
|
heap
|
page read and write
|
||
2644000
|
trusted library allocation
|
page read and write
|
||
2FA4000
|
heap
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
FE00000
|
heap
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
A8B1FFE000
|
stack
|
page read and write
|
||
C964000
|
unkown
|
page read and write
|
||
7FF764861000
|
unkown
|
page execute read
|
||
2FB8000
|
heap
|
page read and write
|
||
3146000
|
trusted library allocation
|
page read and write
|
||
7FF5ED9FF000
|
unkown
|
page readonly
|
||
F56D8BF000
|
stack
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
2EC46601000
|
heap
|
page read and write
|
||
7FF5ED76D000
|
unkown
|
page readonly
|
||
2B7A000
|
trusted library allocation
|
page read and write
|
||
9AA0000
|
unkown
|
page read and write
|
||
229666B4000
|
heap
|
page read and write
|
||
4E84000
|
trusted library allocation
|
page read and write
|
||
3791000
|
unkown
|
page read and write
|
||
3037000
|
heap
|
page read and write
|
||
229663B5000
|
heap
|
page read and write
|
||
C0003DE000
|
direct allocation
|
page read and write
|
||
1DCE97C0000
|
heap
|
page read and write
|
||
2B39000
|
trusted library allocation
|
page read and write
|
||
142000
|
trusted library allocation
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
3044000
|
heap
|
page read and write
|
||
3037000
|
heap
|
page read and write
|
||
2CDF000
|
trusted library allocation
|
page read and write
|
||
2EC2E0C0000
|
heap
|
page read and write
|
||
C811000
|
unkown
|
page read and write
|
||
3105000
|
trusted library allocation
|
page read and write
|
||
317F000
|
trusted library allocation
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
3359000
|
trusted library allocation
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
F56D9CE000
|
stack
|
page read and write
|
||
3148000
|
trusted library allocation
|
page read and write
|
||
3134000
|
trusted library allocation
|
page read and write
|
||
2ADF000
|
trusted library allocation
|
page read and write
|
||
2EC46130000
|
heap
|
page execute and read and write
|
||
2B50000
|
trusted library allocation
|
page read and write
|
||
271E000
|
heap
|
page read and write
|
||
2448000
|
unkown
|
page readonly
|
||
15BF3A66000
|
heap
|
page read and write
|
||
37BD000
|
unkown
|
page read and write
|
||
7FF5EDA0D000
|
unkown
|
page readonly
|
||
7FF5ED418000
|
unkown
|
page readonly
|
||
7FF5ED755000
|
unkown
|
page readonly
|
||
622000
|
heap
|
page read and write
|
||
3148000
|
trusted library allocation
|
page read and write
|
||
1DCCE944000
|
trusted library allocation
|
page read and write
|
||
2BEB000
|
trusted library allocation
|
page read and write
|
||
3020000
|
stack
|
page read and write
|
||
A11F000
|
stack
|
page read and write
|
||
3ABAFFD000
|
stack
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
2A18000
|
trusted library allocation
|
page read and write
|
||
3137000
|
trusted library allocation
|
page read and write
|
||
C000378000
|
direct allocation
|
page read and write
|
||
3040000
|
unkown
|
page read and write
|
||
3ABC3FE000
|
stack
|
page read and write
|
||
A494000
|
unkown
|
page read and write
|
||
2B4C000
|
trusted library allocation
|
page read and write
|
||
5FA000
|
heap
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
7D90000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
591000
|
heap
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page read and write
|
||
2EC2F8B5000
|
trusted library allocation
|
page read and write
|
||
335A000
|
trusted library allocation
|
page read and write
|
||
4F7C000
|
trusted library allocation
|
page read and write
|
||
CA7C000
|
unkown
|
page read and write
|
||
2BB1000
|
trusted library allocation
|
page read and write
|
||
6CAC0000
|
unkown
|
page readonly
|
||
7FF65BBE8000
|
unkown
|
page write copy
|
||
25E0000
|
direct allocation
|
page read and write
|
||
EF5A2FB000
|
stack
|
page read and write
|
||
3040000
|
unkown
|
page read and write
|
||
7D90000
|
unkown
|
page read and write
|
||
6CA50000
|
unkown
|
page readonly
|
||
6CAC0000
|
unkown
|
page readonly
|
||
5528000
|
heap
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
229666B0000
|
heap
|
page read and write
|
||
5BA0000
|
trusted library allocation
|
page read and write
|
||
FE70000
|
unkown
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
B370000
|
unkown
|
page read and write
|
||
2FA4000
|
heap
|
page read and write
|
||
4F41000
|
trusted library allocation
|
page read and write
|
||
1A460C26000
|
direct allocation
|
page read and write
|
||
5F9000
|
heap
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page read and write
|
||
7FF5ED3EA000
|
unkown
|
page readonly
|
||
3030000
|
unkown
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
1DCCE409000
|
trusted library allocation
|
page read and write
|
||
7FF5ED9D6000
|
unkown
|
page readonly
|
||
3030000
|
unkown
|
page read and write
|
||
37F9000
|
unkown
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
6000000
|
trusted library allocation
|
page read and write
|
||
15BD96F0000
|
heap
|
page read and write
|
||
7D80000
|
unkown
|
page read and write
|
||
6030000
|
trusted library allocation
|
page read and write
|
||
3034000
|
heap
|
page read and write
|
||
4151000
|
heap
|
page read and write
|
||
965C000
|
stack
|
page read and write
|
||
7FF5ED9D9000
|
unkown
|
page readonly
|
||
2C04000
|
trusted library allocation
|
page read and write
|
||
4B93000
|
unkown
|
page read and write
|
||
7FF5ED8FF000
|
unkown
|
page readonly
|
||
7D80000
|
unkown
|
page read and write
|
||
2EC2EA65000
|
trusted library allocation
|
page read and write
|
||
7FDF0000
|
trusted library allocation
|
page execute and read and write
|
||
2EC2C3B0000
|
trusted library allocation
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
76A0000
|
unkown
|
page read and write
|
||
5FF0000
|
trusted library allocation
|
page read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
7D20000
|
unkown
|
page readonly
|
||
5E0E000
|
stack
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
3021000
|
heap
|
page read and write
|
||
3050000
|
unkown
|
page read and write
|
||
7D80000
|
unkown
|
page read and write
|
||
423000
|
unkown
|
page write copy
|
||
C000132000
|
direct allocation
|
page read and write
|
||
3756000
|
unkown
|
page read and write
|
||
2EC3E3C5000
|
trusted library allocation
|
page read and write
|
||
2EC460F0000
|
heap
|
page execute and read and write
|
||
B370000
|
unkown
|
page read and write
|
||
7FFD9B864000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
7FF764860000
|
unkown
|
page readonly
|
||
2EC46205000
|
heap
|
page read and write
|
||
A479000
|
unkown
|
page read and write
|
||
22966340000
|
heap
|
page read and write
|
||
5046000
|
trusted library allocation
|
page read and write
|
||
3240000
|
unkown
|
page read and write
|
||
C00016C000
|
direct allocation
|
page read and write
|
||
7FFD9B89D000
|
trusted library allocation
|
page execute and read and write
|
||
311E000
|
trusted library allocation
|
page read and write
|
||
50ED000
|
trusted library allocation
|
page read and write
|
||
1DCCC4F6000
|
heap
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
2EC2E0D1000
|
trusted library allocation
|
page read and write
|
||
334B000
|
trusted library allocation
|
page read and write
|
||
9893000
|
unkown
|
page read and write
|
||
4B8B000
|
unkown
|
page read and write
|
||
3020000
|
unkown
|
page read and write
|
||
7FFD9BBD3000
|
trusted library allocation
|
page read and write
|
||
1DCCC45F000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
7D53000
|
unkown
|
page read and write
|
||
B8AB000
|
stack
|
page read and write
|
||
3010000
|
stack
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
3173000
|
trusted library allocation
|
page read and write
|
||
300D000
|
heap
|
page read and write
|
||
41F000
|
unkown
|
page readonly
|
||
C52C000
|
unkown
|
page read and write
|
||
3040000
|
unkown
|
page read and write
|
||
3748000
|
unkown
|
page read and write
|
||
AB5E000
|
unkown
|
page read and write
|
||
2B8F000
|
trusted library allocation
|
page read and write
|
||
301D000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
7DB0000
|
unkown
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
7CE0000
|
unkown
|
page read and write
|
||
7FFD9B860000
|
trusted library allocation
|
page read and write
|
||
54C1000
|
heap
|
page read and write
|
||
318F000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
AAF6000
|
unkown
|
page read and write
|
||
1DCE6A70000
|
heap
|
page read and write
|
||
3540000
|
heap
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
2B30000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
4BE1000
|
unkown
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page execute and read and write
|
||
2950000
|
heap
|
page execute and read and write
|
||
3150000
|
unkown
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
3377000
|
trusted library allocation
|
page read and write
|
||
7D90000
|
unkown
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7FFD9B93C000
|
trusted library allocation
|
page execute and read and write
|
||
5D1000
|
heap
|
page read and write
|
||
7FF5ED9A6000
|
unkown
|
page readonly
|
||
316E000
|
trusted library allocation
|
page read and write
|
||
4E1F000
|
stack
|
page read and write
|
||
380E000
|
stack
|
page read and write
|
||
3047000
|
heap
|
page read and write
|
||
5C9000
|
heap
|
page read and write
|
||
2C2D000
|
trusted library allocation
|
page read and write
|
||
785F000
|
unkown
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
3037000
|
heap
|
page read and write
|
||
2B82000
|
trusted library allocation
|
page read and write
|
||
2AC1000
|
trusted library allocation
|
page read and write
|
||
3FE1000
|
unclassified section
|
page write copy
|
||
335A000
|
trusted library allocation
|
page read and write
|
||
7FF5ED3DA000
|
unkown
|
page readonly
|
||
2C16000
|
trusted library allocation
|
page read and write
|
||
26E0000
|
direct allocation
|
page execute and read and write
|
||
9CFC000
|
stack
|
page read and write
|
||
3136000
|
trusted library allocation
|
page read and write
|
||
7FFD9B936000
|
trusted library allocation
|
page read and write
|
||
2534000
|
heap
|
page read and write
|
||
7FF65C227000
|
unkown
|
page write copy
|
||
2C26000
|
trusted library allocation
|
page read and write
|
||
6030000
|
trusted library allocation
|
page read and write
|
||
2AD7000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
3030000
|
stack
|
page read and write
|
||
60000
|
direct allocation
|
page execute and read and write
|
||
20A584E8000
|
heap
|
page read and write
|
||
3A87000
|
trusted library allocation
|
page read and write
|
||
9AC0000
|
unkown
|
page read and write
|
||
C0002A5000
|
direct allocation
|
page read and write
|
||
3346000
|
trusted library allocation
|
page read and write
|
||
15BD9735000
|
heap
|
page read and write
|
||
9660000
|
unkown
|
page read and write
|
||
4E3C000
|
stack
|
page read and write
|
||
405000
|
unkown
|
page readonly
|
||
7FF5ED986000
|
unkown
|
page readonly
|
||
2ADB000
|
trusted library allocation
|
page read and write
|
||
20A582F0000
|
heap
|
page read and write
|
||
7FF5ED495000
|
unkown
|
page readonly
|
||
9C000
|
stack
|
page read and write
|
||
B22B000
|
stack
|
page read and write
|
||
7D90000
|
unkown
|
page read and write
|
||
2C10000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
7D80000
|
unkown
|
page read and write
|
||
3047000
|
heap
|
page read and write
|
||
1A460C64000
|
direct allocation
|
page read and write
|
||
20A58300000
|
heap
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
40AF000
|
stack
|
page read and write
|
||
C000059000
|
direct allocation
|
page read and write
|
||
3B9F000
|
stack
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
2AE2000
|
trusted library allocation
|
page read and write
|
||
1DCE8118000
|
heap
|
page read and write
|
||
9AE0000
|
unkown
|
page read and write
|
||
3166000
|
trusted library allocation
|
page read and write
|
||
C0003D8000
|
direct allocation
|
page read and write
|
||
C50A000
|
unkown
|
page read and write
|
||
9E000
|
stack
|
page read and write
|
||
7FF5ED471000
|
unkown
|
page readonly
|
||
2C22000
|
trusted library allocation
|
page read and write
|
||
2A3E000
|
stack
|
page read and write
|
||
7FFD9B882000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
C000284000
|
direct allocation
|
page read and write
|
||
78A0000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
488000
|
heap
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
402000
|
unkown
|
page readonly
|
||
3032000
|
heap
|
page read and write
|
||
C0000BC000
|
direct allocation
|
page read and write
|
||
88EE000
|
stack
|
page read and write
|
||
20A56919000
|
heap
|
page read and write
|
||
2C25000
|
trusted library allocation
|
page read and write
|
||
4F67000
|
trusted library allocation
|
page read and write
|
||
F56DA4F000
|
stack
|
page read and write
|
||
7FF5ED6A5000
|
unkown
|
page readonly
|
||
7D80000
|
unkown
|
page read and write
|
||
2EC2C275000
|
heap
|
page read and write
|
||
3568000
|
trusted library allocation
|
page read and write
|
||
1095000
|
stack
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
9792000
|
unkown
|
page read and write
|
||
318C000
|
trusted library allocation
|
page read and write
|
||
2C22000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5ED71B000
|
unkown
|
page readonly
|
||
2BCF000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
C000084000
|
direct allocation
|
page read and write
|
||
7867000
|
unkown
|
page read and write
|
||
2A10000
|
heap
|
page execute and read and write
|
||
1DCE7A80000
|
trusted library allocation
|
page read and write
|
||
4B50000
|
unkown
|
page read and write
|
||
5CE0000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
7FF5ED68C000
|
unkown
|
page readonly
|
||
3016000
|
heap
|
page read and write
|
||
4F99000
|
trusted library allocation
|
page read and write
|
||
5CE7000
|
trusted library allocation
|
page read and write
|
||
2D3D000
|
stack
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
384E000
|
stack
|
page read and write
|
||
27B0000
|
heap
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
C0000A0000
|
direct allocation
|
page read and write
|
||
7FF65BBD2000
|
unkown
|
page read and write
|
||
7FF5ED9CA000
|
unkown
|
page readonly
|
||
7FF7648ED000
|
unkown
|
page readonly
|
||
113000
|
trusted library allocation
|
page execute and read and write
|
||
2EC2F71C000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
3ABABFF000
|
stack
|
page read and write
|
||
7FF5ED74A000
|
unkown
|
page readonly
|
||
1DCCC580000
|
trusted library allocation
|
page read and write
|
||
6CA61000
|
unkown
|
page execute read
|
||
170000
|
trusted library allocation
|
page execute and read and write
|
||
3137000
|
trusted library allocation
|
page read and write
|
||
3137000
|
trusted library allocation
|
page read and write
|
||
2EC2C277000
|
heap
|
page read and write
|
||
20A58230000
|
heap
|
page read and write
|
||
2B88000
|
trusted library allocation
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
1DCE8170000
|
heap
|
page read and write
|
||
57C0000
|
trusted library allocation
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
1DCE8198000
|
heap
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
3137000
|
trusted library allocation
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
4F62000
|
trusted library allocation
|
page read and write
|
||
A8B2BFE000
|
stack
|
page read and write
|
||
C000100000
|
direct allocation
|
page read and write
|
||
7FF5ED942000
|
unkown
|
page readonly
|
||
B330000
|
unkown
|
page read and write
|
||
C0000D4000
|
direct allocation
|
page read and write
|
||
7FF764860000
|
unkown
|
page readonly
|
||
4F93000
|
trusted library allocation
|
page read and write
|
||
6010000
|
trusted library allocation
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
7BF000
|
stack
|
page read and write
|
||
2B05000
|
trusted library allocation
|
page read and write
|
||
3037000
|
heap
|
page read and write
|
||
7FD6BFF000
|
stack
|
page read and write
|
||
2EC2F8BD000
|
trusted library allocation
|
page read and write
|
||
4FA2000
|
trusted library allocation
|
page read and write
|
||
3163000
|
trusted library allocation
|
page read and write
|
||
3047000
|
heap
|
page read and write
|
||
5480000
|
trusted library allocation
|
page read and write
|
||
3CE24FF000
|
stack
|
page read and write
|
||
3122000
|
trusted library allocation
|
page read and write
|
||
36D5000
|
stack
|
page read and write
|
||
54A0000
|
trusted library allocation
|
page read and write
|
||
C000094000
|
direct allocation
|
page read and write
|
||
B370000
|
unkown
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
4F5F000
|
trusted library allocation
|
page read and write
|
||
28FE000
|
stack
|
page read and write
|
||
2AF4000
|
trusted library allocation
|
page read and write
|
||
5444000
|
trusted library allocation
|
page read and write
|
||
2EC2F533000
|
trusted library allocation
|
page read and write
|
||
4BDC000
|
unkown
|
page read and write
|
||
4130000
|
heap
|
page read and write
|
||
3129000
|
trusted library allocation
|
page read and write
|
||
275A52B0000
|
heap
|
page read and write
|
||
2EC2C360000
|
trusted library allocation
|
page read and write
|
||
75F000
|
stack
|
page read and write
|
||
2C8E000
|
trusted library allocation
|
page read and write
|
||
2A4C000
|
trusted library allocation
|
page read and write
|
||
313F000
|
trusted library allocation
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
C00005B000
|
direct allocation
|
page read and write
|
||
8108000
|
stack
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
3020000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
2EC2E499000
|
trusted library allocation
|
page read and write
|
||
7FF5ED980000
|
unkown
|
page readonly
|
||
257A000
|
heap
|
page read and write
|
||
2A81000
|
trusted library allocation
|
page read and write
|
||
7FF65BB4E000
|
unkown
|
page write copy
|
||
2AC0000
|
trusted library allocation
|
page read and write
|
||
15BD9520000
|
heap
|
page read and write
|
||
4E90000
|
trusted library allocation
|
page read and write
|
||
7FF5ED5EB000
|
unkown
|
page readonly
|
||
B330000
|
unkown
|
page read and write
|
||
3ABA3FF000
|
stack
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
7FF5ED8C1000
|
unkown
|
page readonly
|
||
2EC2E090000
|
heap
|
page execute and read and write
|
||
314E000
|
trusted library allocation
|
page read and write
|
||
316E000
|
trusted library allocation
|
page read and write
|
||
37F6000
|
unkown
|
page read and write
|
||
785B000
|
unkown
|
page read and write
|
||
3038000
|
heap
|
page read and write
|
||
147000
|
trusted library allocation
|
page execute and read and write
|
||
20A568FD000
|
heap
|
page read and write
|
||
7FF5ED46E000
|
unkown
|
page readonly
|
||
B330000
|
unkown
|
page read and write
|
||
C0000AC000
|
direct allocation
|
page read and write
|
||
3122000
|
trusted library allocation
|
page read and write
|
||
3146000
|
trusted library allocation
|
page read and write
|
||
28F83055000
|
heap
|
page read and write
|
||
20A56926000
|
heap
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
2EC2F953000
|
trusted library allocation
|
page read and write
|
||
4F7000
|
heap
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
2EC3E101000
|
trusted library allocation
|
page read and write
|
||
978E000
|
unkown
|
page read and write
|
||
2C86000
|
trusted library allocation
|
page read and write
|
||
2B3F000
|
trusted library allocation
|
page read and write
|
||
C00003F000
|
direct allocation
|
page read and write
|
||
5BCC000
|
stack
|
page read and write
|
||
2A16000
|
trusted library allocation
|
page read and write
|
||
7FF764860000
|
unkown
|
page readonly
|
||
2C98000
|
trusted library allocation
|
page read and write
|
||
1DCCE49F000
|
trusted library allocation
|
page read and write
|
||
C08A000
|
stack
|
page read and write
|
||
4130000
|
heap
|
page read and write
|
||
B370000
|
unkown
|
page read and write
|
||
2EC2F94D000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
4C4B000
|
unkown
|
page read and write
|
||
7D90000
|
unkown
|
page read and write
|
||
3369000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
9883000
|
unkown
|
page read and write
|
||
4FB4000
|
trusted library allocation
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
7D80000
|
unkown
|
page read and write
|
||
C0000
|
direct allocation
|
page read and write
|
||
FC63000
|
unkown
|
page read and write
|
||
3ABBFFE000
|
stack
|
page read and write
|
||
7FF5ED1D0000
|
unkown
|
page readonly
|
||
3170000
|
unkown
|
page read and write
|
||
1DCE80E2000
|
heap
|
page read and write
|
||
621000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
2710000
|
heap
|
page read and write
|
||
4BA6000
|
unkown
|
page read and write
|
||
2B11000
|
trusted library allocation
|
page read and write
|
||
51B5000
|
trusted library allocation
|
page read and write
|
||
7FF5ED279000
|
unkown
|
page readonly
|
||
303E000
|
heap
|
page read and write
|
||
2B41000
|
trusted library allocation
|
page read and write
|
||
4F6C000
|
trusted library allocation
|
page read and write
|
||
C5AA000
|
unkown
|
page read and write
|
||
1A460BA1000
|
direct allocation
|
page read and write
|
||
2A06000
|
trusted library allocation
|
page read and write
|
||
B00B000
|
stack
|
page read and write
|
||
C89A000
|
unkown
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
7FF5ED2A4000
|
unkown
|
page readonly
|
||
11D000
|
trusted library allocation
|
page execute and read and write
|
||
303C000
|
heap
|
page read and write
|
||
3047000
|
heap
|
page read and write
|
||
C6E3000
|
unkown
|
page read and write
|
||
272D000
|
heap
|
page execute and read and write
|
||
A8B1BFD000
|
stack
|
page read and write
|
||
2B20000
|
trusted library allocation
|
page read and write
|
||
2B46000
|
trusted library allocation
|
page read and write
|
||
7FF5ED818000
|
unkown
|
page readonly
|
||
9B5B000
|
stack
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
3290000
|
unkown
|
page read and write
|
||
2EC46802000
|
heap
|
page read and write
|
||
3040000
|
unkown
|
page read and write
|
||
C0001DA000
|
direct allocation
|
page read and write
|
||
3037000
|
heap
|
page read and write
|
||
4FA3000
|
trusted library allocation
|
page read and write
|
||
977A000
|
unkown
|
page read and write
|
||
1E64A6FA000
|
heap
|
page read and write
|
||
7D40000
|
unkown
|
page read and write
|
||
5CE5000
|
trusted library allocation
|
page read and write
|
||
7FF5ED4B4000
|
unkown
|
page readonly
|
||
2EC461DA000
|
heap
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
5CE0000
|
trusted library allocation
|
page read and write
|
||
FC000
|
stack
|
page read and write
|
||
7FF5ED714000
|
unkown
|
page readonly
|
||
304E000
|
heap
|
page read and write
|
||
3020000
|
unkown
|
page read and write
|
||
7FD64FF000
|
stack
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
6CAAB000
|
unkown
|
page read and write
|
||
2BA9000
|
trusted library allocation
|
page read and write
|
||
1A460D90000
|
direct allocation
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
1DCE693E000
|
heap
|
page read and write
|
||
4F44000
|
trusted library allocation
|
page read and write
|
||
2B91000
|
trusted library allocation
|
page read and write
|
||
C0005DC000
|
direct allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
7FF5ED800000
|
unkown
|
page readonly
|
||
3359000
|
trusted library allocation
|
page read and write
|
||
A33E000
|
unkown
|
page read and write
|
||
4E70000
|
trusted library allocation
|
page read and write
|
||
335A000
|
trusted library allocation
|
page read and write
|
||
7FF5ED7C4000
|
unkown
|
page readonly
|
||
9A60000
|
unkown
|
page read and write
|
||
7D80000
|
unkown
|
page read and write
|
||
7DB0000
|
unkown
|
page read and write
|
||
C857000
|
unkown
|
page read and write
|
||
7E60000
|
unkown
|
page read and write
|
||
2A39000
|
trusted library allocation
|
page read and write
|
||
4BD000
|
heap
|
page read and write
|
||
2560000
|
direct allocation
|
page execute and read and write
|
||
3047000
|
heap
|
page read and write
|
||
2EC2C1B0000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
2EC2F965000
|
trusted library allocation
|
page read and write
|
||
7FF5ED4A1000
|
unkown
|
page readonly
|
||
34E6000
|
stack
|
page read and write
|
||
B370000
|
unkown
|
page read and write
|
||
1A41B7A0000
|
heap
|
page read and write
|
||
7FF5ED7E0000
|
unkown
|
page readonly
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
C00005D000
|
direct allocation
|
page read and write
|
||
9AA0000
|
unkown
|
page read and write
|
||
2AF8000
|
trusted library allocation
|
page read and write
|
||
5B8F000
|
stack
|
page read and write
|
||
5CD0000
|
remote allocation
|
page read and write
|
||
A8B03F5000
|
stack
|
page read and write
|
||
C000052000
|
direct allocation
|
page read and write
|
||
611000
|
heap
|
page read and write
|
||
316E000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
2BF3000
|
trusted library allocation
|
page read and write
|
||
35D0000
|
unkown
|
page read and write
|
||
4FCD000
|
trusted library allocation
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
7869000
|
unkown
|
page read and write
|
||
2C52000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
2BAA000
|
trusted library allocation
|
page read and write
|
||
5DC000
|
heap
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
3D341FD000
|
stack
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
1DCCC428000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
4EAD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page execute and read and write
|
||
2634000
|
trusted library allocation
|
page read and write
|
||
3359000
|
trusted library allocation
|
page read and write
|
||
4F00000
|
heap
|
page execute and read and write
|
||
15BF3A40000
|
heap
|
page read and write
|
||
2B82000
|
trusted library allocation
|
page read and write
|
||
FE4D000
|
unkown
|
page read and write
|
||
7FF5ED52F000
|
unkown
|
page readonly
|
||
6000000
|
trusted library allocation
|
page read and write
|
||
2AD3000
|
trusted library allocation
|
page read and write
|
||
FCAB000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
5F3000
|
heap
|
page read and write
|
||
37D7000
|
trusted library allocation
|
page read and write
|
||
3965000
|
trusted library allocation
|
page read and write
|
||
BDC0000
|
unkown
|
page readonly
|
||
20A568A0000
|
heap
|
page read and write
|
||
2860000
|
heap
|
page read and write
|
||
7FF5ED1CC000
|
unkown
|
page readonly
|
||
7FFD9B880000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA1A000
|
trusted library allocation
|
page read and write
|
||
594E000
|
stack
|
page read and write
|
||
7FD63FF000
|
stack
|
page read and write
|
||
7FF5ED849000
|
unkown
|
page readonly
|
||
5115000
|
trusted library allocation
|
page read and write
|
||
410000
|
heap
|
page read and write
|
||
4ED0000
|
trusted library allocation
|
page read and write
|
||
7DB0000
|
unkown
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
2EC2C1F0000
|
heap
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
2C58000
|
trusted library allocation
|
page read and write
|
||
7FF5EDA69000
|
unkown
|
page readonly
|
||
2530000
|
heap
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
1DCCE2D7000
|
trusted library allocation
|
page read and write
|
||
7FF5ED864000
|
unkown
|
page readonly
|
||
300C000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
7FFD9B884000
|
trusted library allocation
|
page read and write
|
||
57C0000
|
trusted library allocation
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCF0000
|
trusted library allocation
|
page read and write
|
||
37B0000
|
unkown
|
page read and write
|
||
3047000
|
heap
|
page read and write
|
||
7FF5ED337000
|
unkown
|
page readonly
|
||
B330000
|
unkown
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
7FFD9BBF4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
3050000
|
unkown
|
page read and write
|
||
2C69000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
C6F2000
|
unkown
|
page read and write
|
||
9AA0000
|
unkown
|
page read and write
|
||
F56D90E000
|
stack
|
page read and write
|
||
2BEF000
|
trusted library allocation
|
page read and write
|
||
2C7F000
|
stack
|
page read and write
|
||
2AF8000
|
trusted library allocation
|
page read and write
|
||
3620000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
3134000
|
trusted library allocation
|
page read and write
|
||
7D80000
|
unkown
|
page read and write
|
||
4E60000
|
trusted library allocation
|
page execute and read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
7FFD9B8A4000
|
trusted library allocation
|
page read and write
|
||
315E000
|
trusted library allocation
|
page read and write
|
||
334A000
|
trusted library allocation
|
page read and write
|
||
7FF5ED586000
|
unkown
|
page readonly
|
||
2FB8000
|
heap
|
page read and write
|
||
1200000
|
unkown
|
page readonly
|
||
1DCE8130000
|
heap
|
page read and write
|
||
3047000
|
heap
|
page read and write
|
||
1DCE7E80000
|
heap
|
page read and write
|
||
3047000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
20A568E5000
|
heap
|
page read and write
|
||
15BEB111000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
20A5691F000
|
heap
|
page read and write
|
||
1DCCE851000
|
trusted library allocation
|
page read and write
|
||
B98DFE000
|
stack
|
page read and write
|
||
3170000
|
trusted library allocation
|
page read and write
|
||
C000098000
|
direct allocation
|
page read and write
|
||
4F49000
|
trusted library allocation
|
page read and write
|
||
2B5B000
|
trusted library allocation
|
page read and write
|
||
615000
|
heap
|
page read and write
|
||
C0003B6000
|
direct allocation
|
page read and write
|
||
F56CAF9000
|
stack
|
page read and write
|
||
4FA2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
5511000
|
heap
|
page read and write
|
||
455000
|
heap
|
page read and write
|
||
C000041000
|
direct allocation
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
7FF5ED1D9000
|
unkown
|
page readonly
|
||
2C20000
|
trusted library allocation
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
2CB6000
|
trusted library allocation
|
page read and write
|
||
2A20000
|
trusted library allocation
|
page read and write
|
||
2C33000
|
trusted library allocation
|
page read and write
|
||
7FF5ED7FD000
|
unkown
|
page readonly
|
||
3359000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
2B9C000
|
trusted library allocation
|
page read and write
|
||
8000000
|
unkown
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
5E5000
|
heap
|
page read and write
|
||
2BAE000
|
trusted library allocation
|
page read and write
|
||
49FE000
|
stack
|
page read and write
|
||
3134000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page execute and read and write
|
||
2EC464C4000
|
heap
|
page read and write
|
||
C000158000
|
direct allocation
|
page read and write
|
||
3040000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
313C000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
C0002D2000
|
direct allocation
|
page read and write
|
||
7FF5ED867000
|
unkown
|
page readonly
|
||
20A568FB000
|
heap
|
page read and write
|
||
7FF65BB4C000
|
unkown
|
page read and write
|
||
2EC3E3B6000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2BB7000
|
trusted library allocation
|
page read and write
|
||
7FF65C256000
|
unkown
|
page readonly
|
||
3030000
|
unkown
|
page read and write
|
||
313D000
|
trusted library allocation
|
page read and write
|
||
3D9F000
|
stack
|
page read and write
|
||
7FF5EDA08000
|
unkown
|
page readonly
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
20A5690E000
|
heap
|
page read and write
|
||
2C94000
|
trusted library allocation
|
page read and write
|
||
2700000
|
remote allocation
|
page read and write
|
||
7FF65C226000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
7FF5ED956000
|
unkown
|
page readonly
|
||
2A00000
|
trusted library allocation
|
page execute and read and write
|
||
C000160000
|
direct allocation
|
page read and write
|
||
2AFC000
|
trusted library allocation
|
page read and write
|
||
B370000
|
unkown
|
page read and write
|
||
3430000
|
unkown
|
page read and write
|
||
2D50000
|
remote allocation
|
page read and write
|
||
54C1000
|
heap
|
page read and write
|
||
7FF5ED81B000
|
unkown
|
page readonly
|
||
405000
|
unkown
|
page readonly
|
||
3030000
|
unkown
|
page read and write
|
||
B140000
|
unkown
|
page readonly
|
||
3190000
|
trusted library allocation
|
page read and write
|
||
2C73000
|
trusted library allocation
|
page read and write
|
||
C0001BD000
|
direct allocation
|
page read and write
|
||
5CF4000
|
trusted library allocation
|
page read and write
|
||
7FF5ED9F2000
|
unkown
|
page readonly
|
||
7FF5ED33F000
|
unkown
|
page readonly
|
||
1370000
|
unkown
|
page read and write
|
||
5636000
|
heap
|
page read and write
|
||
2B80000
|
trusted library allocation
|
page read and write
|
||
1A460BD2000
|
direct allocation
|
page read and write
|
||
270E000
|
stack
|
page read and write
|
||
2540000
|
heap
|
page read and write
|
||
2EC464A0000
|
heap
|
page read and write
|
||
7F2E000
|
stack
|
page read and write
|
||
3129000
|
trusted library allocation
|
page read and write
|
||
C0002C0000
|
direct allocation
|
page read and write
|
||
2B6B000
|
trusted library allocation
|
page read and write
|
||
1DCE8145000
|
heap
|
page read and write
|
||
BA000
|
stack
|
page read and write
|
||
3430000
|
unkown
|
page read and write
|
||
2B33000
|
trusted library allocation
|
page read and write
|
||
3020000
|
unkown
|
page read and write
|
||
2BD2000
|
trusted library allocation
|
page read and write
|
||
7D90000
|
unkown
|
page read and write
|
||
2F84000
|
heap
|
page read and write
|
||
7FFD9BD60000
|
trusted library allocation
|
page read and write
|
||
2CA9000
|
trusted library allocation
|
page read and write
|
||
C0003D6000
|
direct allocation
|
page read and write
|
||
7FFD9BD90000
|
trusted library allocation
|
page read and write
|
||
2B11000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
2AF0000
|
trusted library allocation
|
page read and write
|
||
2EC2C0B0000
|
heap
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
7DB0000
|
unkown
|
page read and write
|
||
1DCE80D0000
|
heap
|
page read and write
|
||
3034000
|
heap
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7FF5ED93E000
|
unkown
|
page readonly
|
||
300E000
|
heap
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
2EC2C27A000
|
heap
|
page read and write
|
||
8730000
|
unkown
|
page read and write
|
||
B370000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3030000
|
heap
|
page read and write
|
||
335A000
|
trusted library allocation
|
page read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
C00003B000
|
direct allocation
|
page read and write
|
||
C0000A8000
|
direct allocation
|
page read and write
|
||
335A000
|
trusted library allocation
|
page read and write
|
||
7FF764861000
|
unkown
|
page execute read
|
||
2BF6000
|
trusted library allocation
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
C51E000
|
unkown
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
3800000
|
unkown
|
page readonly
|
||
4F44000
|
trusted library allocation
|
page read and write
|
||
7D80000
|
unkown
|
page read and write
|
||
3900000
|
direct allocation
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
5E3E000
|
stack
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
7FF5ED915000
|
unkown
|
page readonly
|
||
3040000
|
unkown
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
2BB0000
|
trusted library allocation
|
page read and write
|
||
335A000
|
trusted library allocation
|
page read and write
|
||
3AB9FF5000
|
stack
|
page read and write
|
||
7FF5ED695000
|
unkown
|
page readonly
|
||
C846000
|
unkown
|
page read and write
|
||
89A0000
|
unkown
|
page read and write
|
||
28F831D0000
|
heap
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
1DCCC262000
|
unkown
|
page readonly
|
||
15BD9588000
|
heap
|
page read and write
|
||
20A56925000
|
heap
|
page read and write
|
||
1A460B51000
|
direct allocation
|
page read and write
|
||
1DCCE071000
|
trusted library allocation
|
page read and write
|
||
5DA000
|
heap
|
page read and write
|
||
7FF5ED65C000
|
unkown
|
page readonly
|
||
3420000
|
unkown
|
page read and write
|
||
7FF5ED847000
|
unkown
|
page readonly
|
||
3113000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
7FF65B6B0000
|
unkown
|
page readonly
|
||
7CD0000
|
unkown
|
page read and write
|
||
313D000
|
trusted library allocation
|
page read and write
|
||
37DC000
|
trusted library allocation
|
page read and write
|
||
2A6A000
|
trusted library allocation
|
page read and write
|
||
2A27000
|
trusted library allocation
|
page read and write
|
||
7FF5ED409000
|
unkown
|
page readonly
|
||
3460000
|
unkown
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
8210000
|
unkown
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
2EC2F959000
|
trusted library allocation
|
page read and write
|
||
2EC46770000
|
heap
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
2C06000
|
trusted library allocation
|
page read and write
|
||
3CE22FB000
|
stack
|
page read and write
|
||
7FF5ED8E2000
|
unkown
|
page readonly
|
||
9AA0000
|
unkown
|
page read and write
|
||
2C3D000
|
trusted library allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
6020000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
20A568AC000
|
heap
|
page read and write
|
||
3141000
|
unkown
|
page read and write
|
||
54C0000
|
heap
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
4120000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
7FF764952000
|
unkown
|
page write copy
|
||
B330000
|
unkown
|
page read and write
|
||
3A21000
|
trusted library allocation
|
page read and write
|
||
C544000
|
unkown
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
2EC2C190000
|
heap
|
page read and write
|
||
51EE000
|
trusted library allocation
|
page read and write
|
||
20A5690B000
|
heap
|
page read and write
|
||
2AD1000
|
trusted library allocation
|
page read and write
|
||
15BDAF00000
|
trusted library allocation
|
page read and write
|
||
784A000
|
unkown
|
page read and write
|
||
1DCCC640000
|
trusted library section
|
page readonly
|
||
7DB0000
|
unkown
|
page read and write
|
||
606D000
|
stack
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
1DCCE483000
|
trusted library allocation
|
page read and write
|
||
6000000
|
trusted library allocation
|
page read and write
|
||
A8B37FE000
|
stack
|
page read and write
|
||
4C18000
|
unkown
|
page read and write
|
||
2AD7000
|
trusted library allocation
|
page read and write
|
||
275A52DF000
|
heap
|
page read and write
|
||
4F5F000
|
trusted library allocation
|
page read and write
|
||
3340000
|
trusted library allocation
|
page read and write
|
||
1DCCC633000
|
heap
|
page execute and read and write
|
||
4E90000
|
trusted library allocation
|
page read and write
|
||
3047000
|
heap
|
page read and write
|
||
7D90000
|
unkown
|
page read and write
|
||
3359000
|
trusted library allocation
|
page read and write
|
||
5CD6000
|
trusted library allocation
|
page read and write
|
||
2448000
|
unkown
|
page readonly
|
||
15BD9500000
|
heap
|
page read and write
|
||
3359000
|
trusted library allocation
|
page read and write
|
||
2BD0000
|
trusted library allocation
|
page read and write
|
||
26DE000
|
stack
|
page read and write
|
||
275A53D0000
|
heap
|
page read and write
|
||
477F000
|
stack
|
page read and write
|
||
20A5691B000
|
heap
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
335A000
|
trusted library allocation
|
page read and write
|
||
A502000
|
unkown
|
page read and write
|
||
4F61000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
DE0000
|
unkown
|
page readonly
|
||
7FFD9BDB0000
|
trusted library allocation
|
page read and write
|
||
7D80000
|
unkown
|
page read and write
|
||
7900000
|
unkown
|
page read and write
|
||
A8B618E000
|
stack
|
page read and write
|
||
2AC2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC54000
|
trusted library allocation
|
page read and write
|
||
2C00000
|
trusted library allocation
|
page read and write
|
||
97D4000
|
unkown
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
3797000
|
unkown
|
page read and write
|
||
2B9E000
|
trusted library allocation
|
page read and write
|
||
7FF5ED476000
|
unkown
|
page readonly
|
||
CA20000
|
unkown
|
page read and write
|
||
7FF65BB44000
|
unkown
|
page read and write
|
||
7FFD9BCC4000
|
trusted library allocation
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
4F9C000
|
trusted library allocation
|
page read and write
|
||
7FF5ED793000
|
unkown
|
page readonly
|
||
F56CA7E000
|
stack
|
page read and write
|
||
A8B17FA000
|
stack
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
2ADF000
|
trusted library allocation
|
page read and write
|
||
7FF5ED7DB000
|
unkown
|
page readonly
|
||
3CE23FF000
|
unkown
|
page read and write
|
||
3166000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
7FF5ED93B000
|
unkown
|
page readonly
|
||
4F56000
|
trusted library allocation
|
page read and write
|
||
5F9000
|
heap
|
page read and write
|
||
7FF5ED210000
|
unkown
|
page readonly
|
||
979C000
|
unkown
|
page read and write
|
||
313F000
|
trusted library allocation
|
page read and write
|
||
C000118000
|
direct allocation
|
page read and write
|
||
818E000
|
stack
|
page read and write
|
||
2B2A000
|
trusted library allocation
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
3020000
|
unkown
|
page read and write
|
||
7FF5ED735000
|
unkown
|
page readonly
|
||
3176000
|
trusted library allocation
|
page read and write
|
||
7695000
|
stack
|
page read and write
|
||
29FD000
|
stack
|
page read and write
|
||
310B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page execute and read and write
|
||
7CA0000
|
unkown
|
page read and write
|
||
5CCB000
|
stack
|
page read and write
|
||
316E000
|
trusted library allocation
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page read and write
|
||
314E000
|
trusted library allocation
|
page read and write
|
||
B640000
|
unkown
|
page read and write
|
||
C512000
|
unkown
|
page read and write
|
||
2C14000
|
trusted library allocation
|
page read and write
|
||
B370000
|
unkown
|
page read and write
|
||
3030000
|
heap
|
page read and write
|
||
2EC461F5000
|
heap
|
page read and write
|
||
2F9F000
|
heap
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page read and write
|
||
2A01000
|
trusted library allocation
|
page read and write
|
||
6000000
|
trusted library allocation
|
page read and write
|
||
2A63000
|
trusted library allocation
|
page read and write
|
||
9AE0000
|
unkown
|
page read and write
|
||
28FF000
|
stack
|
page read and write
|
||
7FF5ED46A000
|
unkown
|
page readonly
|
||
1DCE8470000
|
heap
|
page read and write
|
||
5E1000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
F56C77E000
|
stack
|
page read and write
|
||
6020000
|
trusted library allocation
|
page read and write
|
||
2AB1000
|
trusted library allocation
|
page read and write
|
||
2A87000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
7FF5ED20D000
|
unkown
|
page readonly
|
||
9879000
|
unkown
|
page read and write
|
||
87C0000
|
unkown
|
page read and write
|
||
6CAAC000
|
unkown
|
page write copy
|
||
7FF5ED5F7000
|
unkown
|
page readonly
|
||
7FF5ED64F000
|
unkown
|
page readonly
|
||
3030000
|
unkown
|
page read and write
|
||
7FF5ED85F000
|
unkown
|
page readonly
|
||
2EC2E4FD000
|
trusted library allocation
|
page read and write
|
||
4FB0000
|
trusted library allocation
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
405000
|
unkown
|
page readonly
|
||
3036000
|
heap
|
page read and write
|
||
15BD9730000
|
heap
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
3125000
|
trusted library allocation
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page read and write
|
||
7FF5ED928000
|
unkown
|
page readonly
|
||
2743000
|
heap
|
page read and write
|
||
4F81000
|
trusted library allocation
|
page read and write
|
||
B190000
|
unkown
|
page read and write
|
||
37A0000
|
unkown
|
page read and write
|
||
2A7D000
|
trusted library allocation
|
page read and write
|
||
C0000C0000
|
direct allocation
|
page read and write
|
||
5BA0000
|
trusted library allocation
|
page read and write
|
||
2A52000
|
trusted library allocation
|
page read and write
|
||
1A41B8A0000
|
direct allocation
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
2B05000
|
trusted library allocation
|
page read and write
|
||
5C0000
|
direct allocation
|
page execute and read and write
|
||
7FF7648ED000
|
unkown
|
page readonly
|
||
401000
|
unkown
|
page execute read
|
||
2EC2C22D000
|
heap
|
page read and write
|
||
1210000
|
unkown
|
page readonly
|
||
4B1E000
|
stack
|
page read and write
|
||
7FF5ED534000
|
unkown
|
page readonly
|
||
2B5D000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
5FF0000
|
trusted library allocation
|
page execute and read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
7D80000
|
unkown
|
page read and write
|
||
7FFD9BD80000
|
trusted library allocation
|
page read and write
|
||
2EC2F871000
|
trusted library allocation
|
page read and write
|
||
C0001B6000
|
direct allocation
|
page read and write
|
||
B370000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
5F7000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
2EC2F8BB000
|
trusted library allocation
|
page read and write
|
||
304F000
|
heap
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
CB39000
|
unkown
|
page read and write
|
||
C000031000
|
direct allocation
|
page read and write
|
||
9AE0000
|
unkown
|
page read and write
|
||
7FF5D1CCD000
|
unkown
|
page readonly
|
||
1DCCC630000
|
heap
|
page execute and read and write
|
||
C0000AE000
|
direct allocation
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
7FFE000
|
stack
|
page read and write
|
||
2BB5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
7D90000
|
unkown
|
page read and write
|
||
405000
|
unkown
|
page readonly
|
||
7FF764952000
|
unkown
|
page read and write
|
||
2B93000
|
trusted library allocation
|
page read and write
|
||
3032000
|
heap
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page read and write
|
||
3020000
|
unkown
|
page read and write
|
||
3038000
|
heap
|
page read and write
|
||
FD22000
|
unkown
|
page read and write
|
||
C000140000
|
direct allocation
|
page read and write
|
||
C000000000
|
direct allocation
|
page read and write
|
||
1DCCC6F5000
|
heap
|
page read and write
|
||
3147000
|
trusted library allocation
|
page read and write
|
||
2F9F000
|
heap
|
page read and write
|
||
27C9000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
7D80000
|
unkown
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page read and write
|
||
2C0D000
|
trusted library allocation
|
page read and write
|
||
F56CD3E000
|
stack
|
page read and write
|
||
7847000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
9A60000
|
unkown
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page execute and read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
3040000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
313E000
|
trusted library allocation
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
2A74000
|
trusted library allocation
|
page read and write
|
||
3359000
|
trusted library allocation
|
page read and write
|
||
C57F000
|
unkown
|
page read and write
|
||
3346000
|
trusted library allocation
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
1DCCE39E000
|
trusted library allocation
|
page read and write
|
||
9A60000
|
unkown
|
page read and write
|
||
2FA4000
|
heap
|
page read and write
|
||
2880000
|
heap
|
page read and write
|
||
A39B000
|
unkown
|
page read and write
|
||
313E000
|
trusted library allocation
|
page read and write
|
||
1DCE6957000
|
heap
|
page read and write
|
||
1DCE810D000
|
heap
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
3137000
|
trusted library allocation
|
page read and write
|
||
7FF5ED937000
|
unkown
|
page readonly
|
||
3040000
|
unkown
|
page read and write
|
||
AB39000
|
unkown
|
page read and write
|
||
2A5D000
|
trusted library allocation
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
1A41B8A4000
|
direct allocation
|
page read and write
|
||
315E000
|
trusted library allocation
|
page read and write
|
||
7FD6AFE000
|
stack
|
page read and write
|
||
3020000
|
unkown
|
page read and write
|
||
1E64A990000
|
heap
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
15BEB117000
|
trusted library allocation
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
2EC2F95C000
|
trusted library allocation
|
page read and write
|
||
9AA0000
|
unkown
|
page read and write
|
||
7DB0000
|
unkown
|
page read and write
|
||
B330000
|
unkown
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
2EC2F968000
|
trusted library allocation
|
page read and write
|
||
E81D000
|
stack
|
page read and write
|
||
449000
|
trusted library allocation
|
page execute and read and write
|
||
3111000
|
trusted library allocation
|
page read and write
|
||
15BF3883000
|
heap
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
2ABC000
|
trusted library allocation
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
740000
|
remote allocation
|
page execute and read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
E91D000
|
stack
|
page read and write
|
||
7E70000
|
unkown
|
page read and write
|
||
3341000
|
trusted library allocation
|
page read and write
|
||
7865000
|
unkown
|
page read and write
|
||
C516000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
4F42000
|
trusted library allocation
|
page read and write
|
||
3122000
|
trusted library allocation
|
page read and write
|
||
1DCE68F0000
|
heap
|
page read and write
|
||
2B17000
|
trusted library allocation
|
page read and write
|
||
7953000
|
unkown
|
page read and write
|
||
F56C9FE000
|
stack
|
page read and write
|
||
C89C000
|
unkown
|
page read and write
|
||
5E1000
|
heap
|
page read and write
|
||
B987FF000
|
stack
|
page read and write
|
||
15BF3980000
|
heap
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
A50B000
|
unkown
|
page read and write
|
||
9D00000
|
heap
|
page read and write
|
||
3034000
|
heap
|
page read and write
|
||
AF0C000
|
stack
|
page read and write
|
||
6000000
|
trusted library allocation
|
page read and write
|
||
3037000
|
heap
|
page read and write
|
||
3155000
|
trusted library allocation
|
page read and write
|
||
7FF764952000
|
unkown
|
page write copy
|
||
1DCCE986000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC0C000
|
trusted library allocation
|
page read and write
|
||
56D9000
|
unkown
|
page read and write
|
||
2667000
|
trusted library allocation
|
page execute and read and write
|
||
3030000
|
unkown
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
219E000
|
stack
|
page read and write
|
||
2BB3000
|
trusted library allocation
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
303E000
|
heap
|
page read and write
|
||
100000
|
trusted library allocation
|
page read and write
|
||
4FA7000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
C000092000
|
direct allocation
|
page read and write
|
||
15BDB111000
|
trusted library allocation
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
7D80000
|
unkown
|
page read and write
|
||
3037000
|
heap
|
page read and write
|
||
15BF3A50000
|
heap
|
page read and write
|
||
7FF7648ED000
|
unkown
|
page readonly
|
||
2C56000
|
trusted library allocation
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page read and write
|
||
1DCCC50D000
|
heap
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
7FF5ED426000
|
unkown
|
page readonly
|
||
1500000
|
heap
|
page read and write
|
||
A4B8000
|
unkown
|
page read and write
|
||
2B15000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
2B59000
|
trusted library allocation
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
1A460DD0000
|
direct allocation
|
page read and write
|
||
4FCF000
|
trusted library allocation
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
5D01000
|
heap
|
page read and write
|
||
4FCF000
|
trusted library allocation
|
page read and write
|
||
2B76000
|
trusted library allocation
|
page read and write
|
||
987F000
|
unkown
|
page read and write
|
||
7FF5D1CD4000
|
unkown
|
page readonly
|
||
9871000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
7CC0000
|
unkown
|
page readonly
|
||
B370000
|
unkown
|
page read and write
|
||
2BD7000
|
trusted library allocation
|
page read and write
|
||
9B60000
|
unkown
|
page readonly
|
||
C000162000
|
direct allocation
|
page read and write
|
||
C000062000
|
direct allocation
|
page read and write
|
||
7FFD9BCA0000
|
trusted library allocation
|
page read and write
|
||
5A4F000
|
stack
|
page read and write
|
||
7DC0000
|
unkown
|
page read and write
|
||
2C03000
|
trusted library allocation
|
page read and write
|
||
C00009E000
|
direct allocation
|
page read and write
|
||
7FF764860000
|
unkown
|
page readonly
|
||
301F000
|
heap
|
page read and write
|
||
C0003E3000
|
direct allocation
|
page read and write
|
||
9AA0000
|
unkown
|
page read and write
|
||
334A000
|
trusted library allocation
|
page read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
7DF44CF00000
|
trusted library allocation
|
page execute and read and write
|
||
C0008E6000
|
direct allocation
|
page read and write
|
||
2EC30074000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBF9000
|
trusted library allocation
|
page read and write
|
||
310A000
|
trusted library allocation
|
page read and write
|
||
5490000
|
trusted library allocation
|
page read and write
|
||
379E000
|
unkown
|
page read and write
|
||
7FFD9B883000
|
trusted library allocation
|
page execute and read and write
|
||
3420000
|
unkown
|
page read and write
|
||
7FF764952000
|
unkown
|
page read and write
|
||
47B000
|
heap
|
page read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
8BF0000
|
unkown
|
page readonly
|
||
4F64000
|
trusted library allocation
|
page read and write
|
||
BDD0000
|
unkown
|
page readonly
|
||
2EC2F941000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
7FFD9B88D000
|
trusted library allocation
|
page execute and read and write
|
||
C0000B6000
|
direct allocation
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
7FF5ED449000
|
unkown
|
page readonly
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
3034000
|
heap
|
page read and write
|
||
3170000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
1E64A6F5000
|
heap
|
page read and write
|
||
A379000
|
unkown
|
page read and write
|
||
FD39000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2620000
|
trusted library allocation
|
page read and write
|
||
2B35000
|
trusted library allocation
|
page read and write
|
||
57AE000
|
trusted library allocation
|
page read and write
|
||
7DD0000
|
unkown
|
page read and write
|
||
7D80000
|
unkown
|
page read and write
|
||
6C9F1000
|
unkown
|
page execute read
|
||
4F58000
|
trusted library allocation
|
page read and write
|
||
7FF5ED853000
|
unkown
|
page readonly
|
||
35A0000
|
unkown
|
page readonly
|
||
33B9000
|
stack
|
page read and write
|
||
303E000
|
heap
|
page read and write
|
||
3A25000
|
trusted library allocation
|
page read and write
|
||
2771000
|
unclassified section
|
page readonly
|
||
BC9B000
|
stack
|
page read and write
|
||
7FF5ED9C6000
|
unkown
|
page readonly
|
||
1370000
|
unkown
|
page read and write
|
||
C00013C000
|
direct allocation
|
page read and write
|
||
9AA0000
|
unkown
|
page read and write
|
||
3030000
|
unkown
|
page read and write
|
||
2EC461D0000
|
heap
|
page read and write
|
||
336A000
|
trusted library allocation
|
page read and write
|
||
4B56000
|
unkown
|
page read and write
|
||
2BB4000
|
trusted library allocation
|
page read and write
|
||
E0000
|
trusted library section
|
page read and write
|
||
3020000
|
unkown
|
page read and write
|
||
4F8D000
|
trusted library allocation
|
page read and write
|
||
3034000
|
heap
|
page read and write
|
||
310E000
|
stack
|
page read and write
|
||
1370000
|
unkown
|
page read and write
|
||
FE54000
|
unkown
|
page read and write
|
||
3047000
|
heap
|
page read and write
|
||
3420000
|
unkown
|
page read and write
|
||
2B97000
|
trusted library allocation
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
7D80000
|
unkown
|
page read and write
|
||
275E000
|
unclassified section
|
page readonly
|
||
7FF65BBCE000
|
unkown
|
page write copy
|
||
7FD66FF000
|
stack
|
page read and write
|
||
3ABBBFE000
|
stack
|
page read and write
|
There are 3548 hidden memdumps, click here to show them.